r0idamcp is an MCP server that automates reverse engineering in IDA Pro using LLM assistants. It exposes SSE protocol for real-time interaction, providing tools to analyze binaries, extract code structures, and generate human-readable reports. It connects to IDA Pro's API for disassembly and decompilation tasks. Developers and security researchers use it to speed up malware analysis, vulnerability research, and binary code understanding.
r0idamcp is an MCP server that automates reverse engineering in IDA Pro using LLM assistants. It exposes SSE protocol for real-time interaction, providing tools to analyze binaries, extract code structures, and generate human-readable reports. It connects to IDA Pro's API for disassembly and decompilation tasks. Developers and security researchers use it to speed up malware analysis, vulnerability research, and binary code understanding.
pip install r0idamcpAdd this configuration to your claude_desktop_config.json:
{
"mcpServers": {
"r0ysue-r0idamcp-github": {
"command": "uvx",
"args": [
"pip install r0idamcp"
]
}
}
}Restart Claude Desktop, then ask:
"What tools do you have available from r0idamcp?"
No configuration required. This server works out of the box.
"What resources are available in r0idamcp?"
Claude will query available resources and return a list of what you can access.
"Show me details about [specific item] in r0idamcp"
Claude will fetch and display detailed information about the requested item.
"Create a new [item] in r0idamcp with [details]"
Claude will use the appropriate tool to create the resource and confirm success.
We build custom MCP integrations for B2B companies. From simple connections to complex multi-tool setups.