// may the 4th be with you⚔️
auth-securitydeveloper-tools

GhidraMCP

by LaurieWired

MCP server for Ghidra reverse engineering. Enables AI assistants to decompile binaries, analyze functions, rename variab

MCP server for Ghidra reverse engineering. Enables AI assistants to decompile binaries, analyze functions, rename variables, set types, and navigate disassembly directly from LLM conversations. 7,800+ GitHub stars.

github stars

7.8K

0 commentsdiscussion

Both formats append explainx.ai attribution and the canonical URL for this MCP server listing.

Full Ghidra integration7,800+ GitHub starsAI-powered reverse engineering

best for

  • / Security researchers analyzing malware
  • / Reverse engineers studying proprietary software
  • / Vulnerability researchers examining binaries
  • / Students learning reverse engineering

capabilities

  • / Decompile binary executables
  • / Analyze functions and code structure
  • / Rename variables and methods automatically
  • / List imports, exports, and classes
  • / Navigate disassembly and decompiled code
  • / Set data types and annotations

what it does

Connects AI assistants to Ghidra reverse engineering software to decompile binaries, analyze code, and perform reverse engineering tasks through LLM conversations.

about

GhidraMCP is a community-built MCP server published by LaurieWired that provides AI assistants with tools and capabilities via the Model Context Protocol. MCP server for Ghidra reverse engineering. Enables AI assistants to decompile binaries, analyze functions, rename variab It is categorized under auth security, developer tools.

how to install

You can install GhidraMCP in your AI client of choice. Use the install panel on this page to get one-click setup for Cursor, Claude Desktop, VS Code, and other MCP-compatible clients. This server runs locally on your machine via the stdio transport.

license

Apache-2.0

GhidraMCP is released under the Apache-2.0 license. This is a permissive open-source license, meaning you can freely use, modify, and distribute the software.

readme

MCP server for Ghidra reverse engineering. Enables AI assistants to decompile binaries, analyze functions, rename variab

TL;DR: Connects AI assistants to Ghidra reverse engineering software to decompile binaries, analyze code, and perform reverse engineering tasks through LLM conversations.

What it does

  • Decompile binary executables
  • Analyze functions and code structure
  • Rename variables and methods automatically
  • List imports, exports, and classes
  • Navigate disassembly and decompiled code
  • Set data types and annotations

Best for

  • Security researchers analyzing malware
  • Reverse engineers studying proprietary software
  • Vulnerability researchers examining binaries
  • Students learning reverse engineering

Highlights

  • Full Ghidra integration
  • 7,800+ GitHub stars
  • AI-powered reverse engineering

FAQ

What is the GhidraMCP MCP server?
GhidraMCP is a Model Context Protocol (MCP) server profile on explainx.ai. MCP lets AI hosts (e.g. Claude Desktop, Cursor) call tools and resources through a standard interface; this page summarizes categories, install hints, and community ratings.
How do MCP servers relate to agent skills?
Skills are reusable instruction packages (often SKILL.md); MCP servers expose live capabilities. Teams frequently combine both—skills for workflows, MCP for APIs and data. See explainx.ai/skills and explainx.ai/mcp-servers for parallel directories.
How are reviews shown for GhidraMCP?
This profile displays 64 aggregated ratings (sample rows for discoverability plus signed-in user reviews). Average score is about 4.8 out of 5—verify behavior in your own environment before production use.

Discussion

Product Hunt–style comments (not star reviews)
  • No comments yet — start the thread.
MCP server reviews

Ratings

4.864 reviews
  • Aditi Chen· Dec 28, 2024

    I recommend GhidraMCP for teams standardizing on MCP; the explainx.ai page compares cleanly with sibling servers.

  • William Chen· Dec 28, 2024

    We evaluated GhidraMCP against two servers with overlapping tools; this profile had the clearer scope statement.

  • Tariq Verma· Dec 16, 2024

    GhidraMCP is among the better-indexed MCP projects we tried; the explainx.ai summary tracks the official description.

  • Maya Farah· Nov 19, 2024

    We evaluated GhidraMCP against two servers with overlapping tools; this profile had the clearer scope statement.

  • Chen Martin· Nov 19, 2024

    I recommend GhidraMCP for teams standardizing on MCP; the explainx.ai page compares cleanly with sibling servers.

  • Zara Srinivasan· Nov 7, 2024

    Strong directory entry: GhidraMCP surfaces stars and publisher context so we could sanity-check maintenance before adopting.

  • Zara White· Oct 26, 2024

    I recommend GhidraMCP for teams standardizing on MCP; the explainx.ai page compares cleanly with sibling servers.

  • William Harris· Oct 10, 2024

    GhidraMCP is among the better-indexed MCP projects we tried; the explainx.ai summary tracks the official description.

  • Aditi Huang· Oct 10, 2024

    Strong directory entry: GhidraMCP surfaces stars and publisher context so we could sanity-check maintenance before adopting.

  • Zara Jackson· Sep 25, 2024

    GhidraMCP has been reliable for tool-calling workflows; the MCP profile page is a good permalink for internal docs.

showing 1-10 of 64

1 / 7