GhidraMCP
UntestedA Model Context Protocol server for Ghidra that enables LLMs to autonomously reverse engineer applications. Provides tools for decompiling binaries, renaming methods and data, and listing methods, classes, imports, and exports.
Install
No auto-install command available for this server.
Check the GitHub repository for setup instructionsSafety Report
details
HTTP server on localhost:8080 with no authentication by default; relies on network isolation
details
Local HTTP bridge between Ghidra plugin and MCP client; CORS policy not documented
details
No rate limiting documented on the local HTTP bridge
details
No known CVEs; small community project with limited attack surface (localhost only)
details
Python MCP bridge with minimal dependencies; Ghidra plugin in Java. No published audit
details
No dangerous code patterns detected
details
Apache 2.0
details
Open source under Apache 2.0 at github.com/LaurieWired/GhidraMCP
details
Actively maintained; v1.4 released, 61+ commits
Compatibility
Tools Provided (27)
list_methods List all function names in the program with pagination
list_classes List all namespace/class names in the program with pagination
decompile_function Decompile a specific function by name and return the decompiled C code
rename_function Rename a function by its current name to a new user-defined name
rename_data Rename a data label at the specified address
list_segments List all memory segments in the program with pagination
list_imports List imported symbols in the program with pagination
list_exports List exported functions and symbols with pagination
list_namespaces List all non-global namespaces in the program with pagination
list_data_items List defined data labels and their values with pagination
search_functions_by_name Search for functions whose name contains the given substring
rename_variable Rename a local variable within a function
get_function_by_address Retrieve a function definition using its memory address
get_current_address Retrieve the address currently selected by the user in Ghidra
get_current_function Retrieve the function currently selected by the user in Ghidra
list_functions List all functions in the database
decompile_function_by_address Decompile a function at the given memory address
disassemble_function Get assembly code (address: instruction; comment) for a function
set_decompiler_comment Set a comment for a given address in the function pseudocode view
set_disassembly_comment Set a comment for a given address in the function disassembly view
rename_function_by_address Rename a function identified by its memory address
set_function_prototype Set a function's prototype (signature)
set_local_variable_type Set the type of a local variable within a function
get_xrefs_to Get all cross-references to the specified address
get_xrefs_from Get all cross-references from the specified address
get_function_xrefs Get all references to the specified function by name
list_strings List all defined strings in the program with their addresses
Frequently Asked Questions
What is GhidraMCP?
A Model Context Protocol server for Ghidra that enables LLMs to autonomously reverse engineer applications. Provides tools for decompiling binaries, renaming methods and data, and listing methods, classes, imports, and exports.
What tools does GhidraMCP provide?
GhidraMCP provides 27 tools including list_methods, list_classes, decompile_function, rename_function. Each tool can be called by AI agents to perform specific operations.
Is GhidraMCP safe to use?
GhidraMCP has not yet been security scanned. We recommend reviewing the source code and safety report before use.
What are alternatives to GhidraMCP?
Similar MCP servers include Ida Pro MCP, Beelzebub, Jadx AI MCP. Each serves a similar purpose but may differ in features, language, and compatibility.
Similar MCP Servers
Ida Pro MCP
CautionMCP server for IDA Pro, allowing you to perform binary analysis with AI assistants. This plugin implement decompilation, disassembly and allows you to generate malware analysis reports automatically.
Beelzebub
VerifiedBeelzebub is a honeypot framework that lets you build honeypot tools using MCP. Its purpose is to detect prompt injection or malicious agent behavior. The underlying idea is to provide the agent with tools it would never use in its normal work.
Jadx AI MCP
CautionJADX-AI-MCP is a plugin and MCP Server for the JADX decompiler that integrates directly with Model Context Protocol (MCP) to provide live reverse engineering support with LLMs like Claude.