GhidraMCP (Reverse Engineering)
MCP server for NSA's Ghidra reverse engineering framework. AI-powered binary analysis, decompilation, and cross-reference navigation.
- Analyze binary files with AI-assisted decompilation
- Navigate cross-references and function calls in compiled code
- Identify potential vulnerabilities in compiled software
5.4K+ stars. AI-assisted reverse engineering for security teams. Multiple enhanced forks with 100-194 tools.
Security researchers and malware analysts who want AI-assisted binary analysis and vulnerability research.
https://github.com/LaurieWired/GhidraMCP
By LaurieWired
How to Get It
Trust Signals Automated Scan
Data & Access
Community Pulse Active
Discussed on Hacker News, Reddit
- MCP server for Ghidra — Hacker News · 356 pts
- Show HN: Ghidra MCP Server – 110 tools for AI-assisted reverse engineering — Hacker News · 298 pts
- Debugger Ghidra Class — Hacker News · 199 pts
22 mentions across 2 sources
Reviewer notes
Automated Scan review. These are observations, not a security certification.
Open source. Requires Ghidra installation.
How to evaluate tools before deploying →
Data shown here comes from public APIs and automated scanning. Reviewer notes reflect one person's experience. This is not a security certification or legal recommendation. Always evaluate tools according to your own organization's policies.