← Back to Claude Tool Reviews

GhidraMCP (Reverse Engineering)

Connector Security Usable

MCP server for NSA's Ghidra reverse engineering framework. AI-powered binary analysis, decompilation, and cross-reference navigation.

8,320 starsApache-2.0 (commercial OK)FreeDeveloper setup
Fair rating — This tool is functional but has notable gaps. Review the evaluation notes below before deploying.

5.4K+ stars. AI-assisted reverse engineering for security teams. Multiple enhanced forks with 100-194 tools.

Security researchers and malware analysts who want AI-assisted binary analysis and vulnerability research.

Claude Code Claude Cowork Claude Chat

https://github.com/LaurieWired/GhidraMCP

By LaurieWired

How to Get It

Option 1: Claude Desktop AppOpen the Customize panel in the sidebar → browse connectors → search and add. Works in Claude Code, Claude Cowork, and Claude Chat.
CostFree

Trust Signals Automated Scan

Stars8,320Contributors10Last updated2025-06-23LicenseApache-2.0 (OK for commercial use)Known CVEsNone found

Data & Access

Data processingPrompts sent to Anthropic API. Enterprise/Team plans exclude training.

Community Pulse Active

Discussed on Hacker News, Reddit

22 mentions across 2 sources

Reviewer notes

Automated Scan review. These are observations, not a security certification.

Open source. Requires Ghidra installation.

How to evaluate tools before deploying →

Data shown here comes from public APIs and automated scanning. Reviewer notes reflect one person's experience. This is not a security certification or legal recommendation. Always evaluate tools according to your own organization's policies.

Evaluation

Ease of Use
3/5
Versatility
2/5
Reliability
3/5
Security
3/5
Overall score2.75 / 5.00 UsableEvaluatedApr 2026

← Back to Claude Tool Reviews