MCPs tagged with reverse engineering
-
JADX-AI-MCP
Automated AI-powered APK analysis via Model Context Protocol.
JADX-AI-MCP is a fully automated server and plugin for integrating Model Context Protocol (MCP) with JADX for the purpose of analyzing Android APKs using large language models such as Claude. It streamlines vulnerability discovery, reverse engineering, and static analysis by leveraging LLMs in conjunction with established tools. The project facilitates real-time code review and efficient collaboration between AI and human analysts.
- ⭐ 637
- MCP
- zinja-coder/jadx-ai-mcp
-
solvitor-mcp
A Rust-based MCP server for extracting Solana smart contract IDL via the Solvitor API.
solvitor-mcp is a Model Context Protocol (MCP) server built in Rust for seamless interaction with the Solvitor API. It allows users to extract Interface Definition Language (IDL) files from closed-source Solana smart contracts using reverse engineering techniques. By exposing a 'decode' tool, it simplifies access to program metadata and supports both 'anchor' and 'native' Solana programs. Integration is straightforward and can be customized with user API keys for secure access.
- ⭐ 2
- MCP
- Adeptus-Innovatio/solvitor-mcp
-
IDA Pro MCP
Enabling Model Context Protocol server integration with IDA Pro for collaborative reverse engineering.
IDA Pro MCP provides a Model Context Protocol (MCP) server that connects the IDA Pro reverse engineering platform to clients supporting the MCP standard. It exposes a wide array of program analysis and manipulation functionalities such as querying metadata, accessing functions, globals, imports, and strings, decompiling code, disassembling, renaming variables, and more, in a standardized way. This enables seamless integration of AI-powered or remote tools with IDA Pro to enhance the reverse engineering workflow.
- ⭐ 4,214
- MCP
- mrexodia/ida-pro-mcp
-
ghidraMCP
MCP server enabling LLMs to autonomously reverse engineer binaries via Ghidra.
ghidraMCP acts as a Model Context Protocol (MCP) server, exposing core Ghidra reverse engineering functionality for use by large language models. It enables model clients to perform actions such as decompilation, binary analysis, and automated renaming of methods and data. The system integrates as both a Ghidra plugin and a Python MCP server, supporting interoperability with various MCP-compliant clients. By bridging Ghidra and MCP, it allows autonomous or semi-autonomous analysis of compiled application binaries.
- ⭐ 6,483
- MCP
- LaurieWired/GhidraMCP
-
GhidrAssistMCP
Bringing Model Context Protocol server connectivity to Ghidra for AI-assisted reverse engineering.
GhidrAssistMCP is a Ghidra extension providing a Model Context Protocol (MCP) server that allows AI assistants and other tools to interact programmatically with Ghidra's reverse engineering platform. It offers a standardized API for querying program data, managing tool interactions, and enabling real-time analysis features. The extension features a configurable UI, built-in logging, and dynamic management of 31 specialized analysis tools.
- ⭐ 337
- MCP
- jtang613/GhidrAssistMCP
-
Binary Ninja MCP
Seamlessly integrate Binary Ninja with Model Context Protocol clients for enhanced reverse engineering.
Binary Ninja MCP enables real-time integration of Binary Ninja's reverse engineering environment with various Model Context Protocol (MCP) clients. It acts as a server exposing Binary Ninja's capabilities via HTTP endpoints and includes a bridge to connect to MCP clients. The extension supports auto-setup with popular clients such as Cline, Claude Desktop, Roo Code, and others, streamlining the use of AI-assisted workflows. This enhances tasks such as analyzing binaries, switching targets, and leveraging LLM-driven automation in reverse engineering.
- ⭐ 112
- MCP
- fosdickio/binary_ninja_mcp
-
GhidraMCP
AI-powered binary analysis through Model Context Protocol integration with Ghidra
GhidraMCP is a Ghidra plugin that implements the Model Context Protocol (MCP), enabling seamless connectivity between Ghidra and AI-powered assistants for advanced binary analysis. It allows users to interact with binaries using natural language, automate security and code analysis, and retrieve detailed program insights through a socket-based architecture. The plugin offers functions for exploring binary structures, analyzing memory layouts, and identifying vulnerabilities, providing a flexible and efficient reverse engineering workflow.
- ⭐ 77
- MCP
- 13bm/GhidraMCP