MCP server for Ghidra reverse engineering — analyze binaries with AI assistance
GhidraMCP connects the NSA's Ghidra reverse engineering framework to AI assistants via MCP. Analyze binaries, decompile functions, explore cross-references, and understand assembly code with AI help.
Ideal for security researchers, malware analysts, and reverse engineers who want AI assistance while working through complex binaries. The server exposes Ghidra's analysis capabilities so your AI can read decompiled code, find function calls, and help annotate findings.
Add this to your MCP configuration file:
{}Verified popular security research MCP server.
Scanned 0 files · 0 findings
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
Be the first to review this server!