reverse-engineering-assistant and BinAssistMCP
These are complementary tools that serve different reverse engineering platforms—one provides MCP integration for Ghidra while the other does so for Binary Ninja—allowing analysts to choose based on their preferred disassembler.
About reverse-engineering-assistant
cyberkaida/reverse-engineering-assistant
MCP server for reverse engineering tasks in Ghidra 👩💻
Exposes Ghidra's analysis capabilities as an MCP server with a tool-driven architecture designed for long-form LLM reasoning, using fragmented context and cross-reference guidance to reduce hallucination. Operates in both assistant mode (interactive analysis with Claude Code/VSCode via HTTP transport) and headless mode (CI/CD automation, Docker, PyGhidra integration). Interoperates with other MCP servers like GitHub and Kagi to augment reverse engineering analysis with external sources.
About BinAssistMCP
symgraph/BinAssistMCP
Binary Ninja plugin to provide MCP functionality.
Exposes Binary Ninja's reverse engineering API through the Model Context Protocol using SSE and Streamable HTTP transports, enabling LLMs to perform AI-assisted binary analysis. Provides 39 consolidated tools covering code analysis, cross-references, symbol management, and data analysis, plus 8 MCP resources and 7 guided prompts for structured workflows. Features thread-safe multi-binary session management with LRU caching and async task support for long-running operations.
Related comparisons
Scores updated daily from GitHub, PyPI, and npm data. How scores work