MCPSERV.CLUB
LaurieWired

GhidraMCP

MCP Server

LLM-powered reverse engineering via Ghidra

Stale(55)
6.3kstars
4views
Updated 11 days ago

About

GhidraMCP is a Model Context Protocol server that exposes Ghidra’s reverse‑engineering tools to large language models, enabling automated decompilation, renaming, and analysis of binaries through MCP clients.

Capabilities

Resources
Access data sources
Tools
Execute functions
Prompts
Pre-built templates
Sampling
AI model interactions

ghidra_MCP_logo

Overview

The ghidraMCP server bridges the powerful reverse‑engineering capabilities of Ghidra with AI assistants that speak the Model Context Protocol. By exposing a rich set of Ghidra tools—such as decompilation, automatic renaming, and comprehensive listings of functions, classes, imports, and exports—this MCP server lets language models interact with binaries as if they were native programming environments. Developers can thus ask an AI to walk through a binary, identify suspicious functions, or even suggest refactorings, all while the AI sends commands to Ghidra and receives structured responses in real time.

At its core, ghidraMCP solves the problem of manual, repetitive analysis steps that traditionally burden reverse‑engineers. Instead of toggling menus and scripting in Ghidra’s UI, an AI can issue high‑level requests such as “list all exported functions” or “decompile the function at address 0x401000.” The server translates these into Ghidra API calls, executes them, and returns clean JSON payloads. This automation accelerates the early stages of analysis, reduces human error, and frees analysts to focus on higher‑level insights.

Key features include:

  • Decompilation & Analysis – The server can decompile any function or block, providing human‑readable C‑like code that the AI can reference or modify.
  • Automatic Renaming – By leveraging Ghidra’s renaming heuristics, the server can rename methods and data structures based on context or AI suggestions, keeping the disassembly tidy.
  • Introspection Tools – Clients can request lists of methods, classes, imports, and exports, enabling the AI to build a mental model of the binary’s architecture before diving deeper.
  • Port Configuration – The plugin exposes an HTTP server that can be bound to any port, allowing seamless integration with a variety of MCP clients such as Claude Desktop, Cline, or 5ire.

Real‑world use cases are plentiful. Security researchers can automate the triage of malware samples by having an AI generate a high‑level threat report after decompiling key routines. Software engineers might use the server to reverse engineer legacy binaries for compatibility layers or to extract undocumented APIs. Academic researchers can prototype new analysis techniques by scripting interactions through an AI, iterating faster than manual GUI workflows.

Integration into existing AI pipelines is straightforward: any MCP‑compliant client can declare ghidraMCP as a remote server, and the AI’s prompt engineering can incorporate Ghidra commands directly. Because the server returns structured data, downstream models can parse results without additional NLP steps, ensuring low latency and high accuracy. The combination of Ghidra’s mature analysis engine with the conversational flexibility of LLMs makes ghidraMCP a standout tool for modern reverse‑engineering workflows.