GhidraMCP exposes Ghidra's reverse engineering capabilities to AI agents. It provides tools for disassembly, decompilation, and analysis of binary files. The server connects to Ghidra's API, allowing agents to automate tasks like code analysis, vulnerability detection, and malware research. Developers and security researchers use it to integrate Ghidra's functionality into AI-driven workflows.
GhidraMCP exposes Ghidra's reverse engineering capabilities to AI agents. It provides tools for disassembly, decompilation, and analysis of binary files. The server connects to Ghidra's API, allowing agents to automate tasks like code analysis, vulnerability detection, and malware research. Developers and security researchers use it to integrate Ghidra's functionality into AI-driven workflows.
Add this configuration to your claude_desktop_config.json:
{
"mcpServers": {
"lauriewired-ghidramcp-github": {
"command": "npx",
"args": [
"-y",
"@modelcontextprotocol/server-lauriewired-ghidramcp-github"
]
}
}
}Restart Claude Desktop, then ask:
"What tools do you have available from GhidraMCP?"
No configuration required. This server works out of the box.
"What resources are available in GhidraMCP?"
Claude will query available resources and return a list of what you can access.
"Show me details about [specific item] in GhidraMCP"
Claude will fetch and display detailed information about the requested item.
"Create a new [item] in GhidraMCP with [details]"
Claude will use the appropriate tool to create the resource and confirm success.
See what tools in your stack can connect to AI.
We build custom MCP integrations for B2B companies. From simple connections to complex multi-tool setups.