GhidraMCP logo

GhidraMCP

by 13bm

GhidraMCP is a Ghidra plugin that implements the Model Context Protocol (MCP) for AI-assisted binary analysis. It bridges the gap between Ghidra's reverse engineering capabilities and AI assistants, making reverse engineering more efficient and accessible.

View on GitHub

Last updated: N/A

What is GhidraMCP?

GhidraMCP is a Ghidra plugin that enables AI models to connect to Ghidra and assist with binary analysis tasks through the Model Context Protocol (MCP). It allows users to leverage AI assistants to gain deeper insights into binaries.

How to use GhidraMCP?

To use GhidraMCP, install the plugin in Ghidra, start the MCP server, and connect an AI assistant using the provided bridge script and configuration. You can then ask natural language questions about the binary and utilize various tools exposed through the MCP interface.

Key features of GhidraMCP

  • AI-Powered Binary Analysis

  • Natural Language Interface

  • Deep Code Insights

  • Binary Structure Analysis

  • Automated Security Analysis

  • Socket-Based Architecture

  • Cross-Platform Compatibility

Use cases of GhidraMCP

  • Analyzing malware to understand its functionality

  • Identifying vulnerabilities in software

  • Reverse engineering proprietary software

  • Automating repetitive analysis tasks

FAQ from GhidraMCP

How do I install GhidraMCP?

Download the latest release ZIP file, open Ghidra, navigate to File > Install Extensions, click the + button and select the downloaded ZIP file, restart Ghidra, and enable the extension.

What are the prerequisites for using GhidraMCP?

Ghidra 11.2.1+, Java 17 or newer, and Python 3.8+ (for the bridge script).

How do I connect Claude to GhidraMCP?

Install the MCP bridge script using pip install FastMCP and configure your Claude MCP setup with the provided JSON configuration.

What port does the MCP server run on by default?

The MCP server runs on port 8765 by default.

What kind of questions can I ask through the MCP interface?

You can ask questions about encryption algorithms, decompiled code, suspicious API calls, the purpose of the binary, authentication mechanisms, potential vulnerabilities, network connections, and more.

GhidraMCP - MCP Server | MCP Directory