GhidraMCP connects the NSA-developed Ghidra reverse engineering framework to AI agents via MCP. Agents can decompile binaries, analyze code flow, identify vulnerabilities, and navigate complex binary code through natural language commands.
GhidraMCP brings NSA’s Ghidra reverse engineering tool to AI agents. Security researchers can ask their AI to decompile functions, trace call graphs, identify vulnerabilities, and annotate code — dramatically accelerating binary analysis.
{
"mcpServers": {
"ghidra": {
"command": "python",
"args": ["-m", "ghidra_mcp_server"]
}
}
}
User: "Decompile main and explain what it does"
Agent: "Main reads config, opens socket on port 4444,
⚠️ uses strcpy (buffer overflow risk at 0x40123C)"
AI agents that work well with Ghidra MCP.