MCP server for reverse engineering tasks in Ghidra. Provides AI-powered analysis, decompilation, and pattern recognition tools. Connects to Ghidra's API for binary analysis. Used by developers and security researchers for malware analysis, vulnerability research, and software debugging.
MCP server for reverse engineering tasks in Ghidra. Provides AI-powered analysis, decompilation, and pattern recognition tools. Connects to Ghidra's API for binary analysis. Used by developers and security researchers for malware analysis, vulnerability research, and software debugging.
Add this configuration to your claude_desktop_config.json:
{
"mcpServers": {
"cyberkaida-reverse-engineering-assistant-github": {
"command": "npx",
"args": [
"-y",
"@modelcontextprotocol/server-cyberkaida-reverse-engineering-assistant-github"
]
}
}
}Restart Claude Desktop, then ask:
"What tools do you have available from reverse engineering assistant?"
No configuration required. This server works out of the box.
"What resources are available in reverse engineering assistant?"
Claude will query available resources and return a list of what you can access.
"Show me details about [specific item] in reverse engineering assistant"
Claude will fetch and display detailed information about the requested item.
"Create a new [item] in reverse engineering assistant with [details]"
Claude will use the appropriate tool to create the resource and confirm success.
See what tools in your stack can connect to AI.
We build custom MCP integrations for B2B companies. From simple connections to complex multi-tool setups.