Ghidra MCP Server – 110 tools for AI-assisted reverse engineering
MCP ServerFreeShow HN: Ghidra MCP Server – 110 tools for AI-assisted reverse engineering
Capabilities13 decomposed
binary function analysis and annotation via llm-assisted disassembly
Medium confidenceLeverages Ghidra's native disassembly engine to extract function boundaries, control flow graphs, and decompiled pseudocode, then pipes structured representations to LLMs for semantic analysis and naming. Uses Ghidra's Java API to traverse the program database (PDB), extract function signatures, and apply AI-generated annotations back to the binary without manual re-analysis.
Directly integrates with Ghidra's Java API and program database to extract and re-annotate binaries in-place, avoiding export/import cycles and preserving analysis state across sessions
Tighter integration with Ghidra than standalone tools like Cutter or IDA plugins, enabling bidirectional annotation flow and access to Ghidra's full decompilation pipeline
cross-reference graph traversal and data-flow tracing
Medium confidenceExposes Ghidra's reference graph (xrefs) as queryable MCP tools, allowing LLMs to trace data flow, call chains, and memory access patterns across the binary. Implements depth-limited graph traversal to prevent explosion, with support for filtering by reference type (read, write, call, flow) and scope (function-local, module-wide, global).
Implements lazy graph expansion with configurable depth limits and reference-type filtering, allowing LLMs to iteratively explore relationships without overwhelming context or hitting API limits
More granular control over graph traversal than Ghidra's GUI-based xref viewer, enabling programmatic exploration suitable for LLM-driven analysis loops
interactive llm-guided reverse engineering with multi-turn context
Medium confidenceMaintains conversation context across multiple analysis queries, allowing LLMs to build understanding incrementally. Implements context management to track analyzed functions, inferred types, and previous findings, enabling coherent multi-turn analysis workflows without redundant re-analysis.
Maintains stateful analysis context across turns, enabling LLMs to build understanding incrementally without re-analyzing previously-examined code
Stateful context management enables more natural conversational analysis than stateless query-response patterns
architecture and calling convention detection with function signature inference
Medium confidenceDetects binary architecture (x86, ARM, MIPS, etc.) and calling convention (cdecl, stdcall, fastcall, etc.) using Ghidra's analysis, then infers function signatures based on parameter passing patterns. Generates type-safe function prototypes suitable for re-implementation or API documentation.
Infers function signatures from parameter passing patterns and calling convention analysis, enabling generation of type-safe prototypes without manual annotation
Automated signature inference reduces manual work compared to manual prototype definition
obfuscation detection and deobfuscation assistance
Medium confidenceDetects common obfuscation techniques (control flow flattening, dead code injection, string encryption, etc.) using pattern matching and heuristics. Provides deobfuscation hints and assists LLMs in understanding obfuscated code by highlighting suspicious patterns and suggesting analysis strategies.
Combines pattern detection with heuristic analysis to identify obfuscation techniques and provide deobfuscation guidance, rather than just flagging suspicious code
Provides actionable deobfuscation hints alongside detection, enabling LLMs to assist in understanding obfuscated code
decompilation-to-pseudocode extraction with language-specific formatting
Medium confidenceWraps Ghidra's decompiler to extract high-level pseudocode for functions, with options to format output as C, Python, or pseudo-assembly for different analysis contexts. Handles decompiler failures gracefully by falling back to raw disassembly, and caches decompilation results to avoid redundant computation.
Offers multiple output formats (C, Python, pseudo-assembly) optimized for different LLM comprehension profiles, rather than single-format decompilation output
More flexible output formatting than Ghidra's native decompiler, enabling downstream LLM processing without manual syntax conversion
memory layout and data structure inference from binary
Medium confidenceAnalyzes Ghidra's type inference engine and data-type definitions to extract inferred struct layouts, class hierarchies, and memory organization. Reconstructs data structures from memory access patterns and type annotations, exposing them as queryable JSON schemas for LLM-driven reverse engineering of complex data types.
Exposes Ghidra's internal type inference engine as queryable MCP tools, allowing LLMs to iteratively refine type understanding through multi-turn analysis
Programmatic access to Ghidra's type system is rare; most tools require manual struct definition or export/import workflows
string and constant extraction with context and usage analysis
Medium confidenceScans the binary for embedded strings, numeric constants, and immediate values, then correlates them with their usage sites (function calls, memory writes, comparisons). Returns structured data including string encoding (ASCII, UTF-16, etc.), cross-references, and inferred purpose based on context.
Correlates strings with their usage context (function calls, memory operations) and infers purpose based on surrounding code patterns, rather than returning isolated string lists
More contextual than simple string dumping tools; provides usage analysis that helps LLMs understand string significance
symbol and import/export table analysis with semantic linking
Medium confidenceParses Ghidra's symbol table, import/export tables, and relocation records to extract function and variable symbols with their addresses, types, and external dependencies. Links symbols to their definitions and usage sites, enabling LLM-driven analysis of API surfaces and external dependencies.
Links symbols to their usage context and external definitions, providing semantic understanding of API dependencies rather than raw symbol enumeration
Integrates symbol analysis with usage tracking, enabling LLMs to understand not just what APIs are imported but how they're used
control flow graph (cfg) extraction and visualization for llm analysis
Medium confidenceExtracts Ghidra's control flow graph for functions as structured JSON, including basic blocks, edges (conditional/unconditional), and loop detection. Supports multiple visualization formats (DOT, JSON, adjacency list) and provides metrics (cyclomatic complexity, loop nesting depth) to help LLMs understand program structure.
Exports CFG with complexity metrics and loop detection, enabling LLMs to prioritize analysis effort based on structural complexity
Provides structured CFG data suitable for LLM processing, rather than visual-only representations
batch binary analysis and report generation
Medium confidenceOrchestrates analysis of multiple binaries in parallel, aggregating results into comprehensive reports with cross-binary comparisons. Uses MCP's async capabilities to manage long-running analyses, with progress tracking and result caching to avoid redundant work.
Leverages MCP's async task model to manage long-running analyses across multiple binaries, with progress tracking and result aggregation
Enables scalable batch analysis without manual orchestration, suitable for large-scale research workflows
semantic search across binary code and metadata
Medium confidenceImplements semantic search using embeddings or keyword matching to find functions, strings, and code patterns matching natural language queries. Integrates with LLM embeddings to enable queries like 'find functions that handle network communication' or 'locate crypto operations'.
Combines keyword and semantic search with LLM embeddings, enabling natural language queries over binary code without manual indexing
More flexible than regex-based search; supports semantic queries that capture intent rather than exact syntax
vulnerability pattern detection and annotation
Medium confidenceImplements pattern matching for known vulnerability signatures (buffer overflows, use-after-free, integer overflows, etc.) using Ghidra's analysis results. Annotates detected patterns with severity, affected functions, and remediation suggestions, enabling LLM-driven vulnerability assessment.
Integrates vulnerability pattern detection with Ghidra's analysis results, enabling context-aware detection that considers data flow and control flow
More sophisticated than simple signature matching; uses Ghidra's analysis to reduce false positives
Capabilities are decomposed by AI analysis. Each maps to specific user intents and improves with match feedback.
Related Artifactssharing capabilities
Artifacts that share capabilities with Ghidra MCP Server – 110 tools for AI-assisted reverse engineering, ranked by overlap. Discovered automatically through the match graph.
IDA Pro MCP
** - MCP Server for automated reverse engineering with IDA Pro.
ida-pro-mcp
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
reversecore_mcp
This PR adds Reversecore MCP, a Python-based reverse engineering server, to the community servers list. It integrates industry-standard tools like Radare2, Ghidra, YARA, and Capstone to enable secure binary analysis via LLMs.
Binary Ninja
** - A Binary Ninja plugin, MCP server, and bridge that seamlessly integrates [Binary Ninja](https://binary.ninja) with your favorite MCP client.
ida-pro-mcp
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
Ape
Revolutionize LLM prompts with advanced tracing and automated...
Best For
- ✓reverse engineers analyzing malware or closed-source binaries
- ✓security researchers automating function classification at scale
- ✓teams migrating from manual RE to AI-assisted workflows
- ✓vulnerability researchers tracing taint flow through binaries
- ✓malware analysts understanding command-and-control communication patterns
- ✓developers decompiling legacy code to extract business logic
- ✓reverse engineers conducting exploratory analysis
- ✓security researchers investigating complex binaries
Known Limitations
- ⚠Accuracy depends on Ghidra's decompilation quality — optimized or stripped binaries may produce incomplete pseudocode
- ⚠LLM context window limits analysis to functions under ~4KB of disassembly; larger functions require chunking
- ⚠No built-in handling of architecture-specific calling conventions beyond Ghidra's native support
- ⚠Graph traversal is limited to statically-resolvable references; indirect calls via function pointers may be missed
- ⚠Performance degrades on large binaries (>10MB) without depth limits; default max depth is 5 levels
- ⚠No support for inter-procedural data-flow analysis (IPDA) — only local reference tracking
Requirements
Input / Output
UnfragileRank
UnfragileRank is computed from adoption signals, documentation quality, ecosystem connectivity, match graph feedback, and freshness. No artifact can pay for a higher rank.
About
Show HN: Ghidra MCP Server – 110 tools for AI-assisted reverse engineering
Categories
Alternatives to Ghidra MCP Server – 110 tools for AI-assisted reverse engineering
Search the Supabase docs for up-to-date guidance and troubleshoot errors quickly. Manage organizations, projects, databases, and Edge Functions, including migrations, SQL, logs, advisors, keys, and type generation, in one flow. Create and manage development branches to iterate safely, confirm costs
Compare →Are you the builder of Ghidra MCP Server – 110 tools for AI-assisted reverse engineering?
Claim this artifact to get a verified badge, access match analytics, see which intents users search for, and manage your listing.
Get the weekly brief
New tools, rising stars, and what's actually worth your time. No spam.
Data Sources
Looking for something else?
Search →