GhidraMCP▌

by LaurieWired
MCP server for Ghidra reverse engineering. Enables AI assistants to decompile binaries, analyze functions, rename variab
MCP server for Ghidra reverse engineering. Enables AI assistants to decompile binaries, analyze functions, rename variables, set types, and navigate disassembly directly from LLM conversations. 7,800+ GitHub stars.
github stars
★ 7.8K
best for
- / Security researchers analyzing malware
- / Reverse engineers studying proprietary software
- / Vulnerability researchers examining binaries
- / Students learning reverse engineering
capabilities
- / Decompile binary executables
- / Analyze functions and code structure
- / Rename variables and methods automatically
- / List imports, exports, and classes
- / Navigate disassembly and decompiled code
- / Set data types and annotations
what it does
Connects AI assistants to Ghidra reverse engineering software to decompile binaries, analyze code, and perform reverse engineering tasks through LLM conversations.
about
GhidraMCP is a community-built MCP server published by LaurieWired that provides AI assistants with tools and capabilities via the Model Context Protocol. MCP server for Ghidra reverse engineering. Enables AI assistants to decompile binaries, analyze functions, rename variab It is categorized under auth security, developer tools.
how to install
You can install GhidraMCP in your AI client of choice. Use the install panel on this page to get one-click setup for Cursor, Claude Desktop, VS Code, and other MCP-compatible clients. This server runs locally on your machine via the stdio transport.
license
Apache-2.0
GhidraMCP is released under the Apache-2.0 license. This is a permissive open-source license, meaning you can freely use, modify, and distribute the software.
readme
MCP server for Ghidra reverse engineering. Enables AI assistants to decompile binaries, analyze functions, rename variab
TL;DR: Connects AI assistants to Ghidra reverse engineering software to decompile binaries, analyze code, and perform reverse engineering tasks through LLM conversations.
What it does
- Decompile binary executables
- Analyze functions and code structure
- Rename variables and methods automatically
- List imports, exports, and classes
- Navigate disassembly and decompiled code
- Set data types and annotations
Best for
- Security researchers analyzing malware
- Reverse engineers studying proprietary software
- Vulnerability researchers examining binaries
- Students learning reverse engineering
Highlights
- Full Ghidra integration
- 7,800+ GitHub stars
- AI-powered reverse engineering