ida-pro-mcp and Reversecore_MCP
These are complementary tools that serve different reverse engineering workflows: IDA Pro integration excels at interactive disassembly and detailed analysis, while the Ghidra/Radare2/YARA orchestration stack provides multi-tool automation and security-focused pattern matching that can be combined for comprehensive analysis pipelines.
About ida-pro-mcp
mrexodia/ida-pro-mcp
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
Exposes IDA Pro's analysis capabilities as MCP tools (decompilation retrieval, disassembly inspection, variable renaming, type correction) that language models can invoke to assist with reverse engineering workflows. Implements both stdio and SSE transports with support for headless analysis via `idalib`, enabling integration with any MCP-compatible client from Claude to VS Code. Includes specialized tooling like `int_convert` for base conversion and session isolation for concurrent multi-agent analysis on different binaries.
About Reversecore_MCP
sjkim1127/Reversecore_MCP
A security-first MCP server empowering AI agents to orchestrate Ghidra, Radare2, and YARA for automated reverse engineering.
Implements a FastMCP-based stdio transport with connection pooling for Radare2 and automatic Ghidra-to-r2 fallback strategies, while providing specialized malware analysis features like dormant threat detection, IOC extraction, and adaptive vaccine generation. Integrates with MCP clients (Cursor, Claude Desktop) via Docker containers with workspace mounting, includes 700+ unit tests and a web dashboard for standalone binary analysis without LLM dependencies.
Related comparisons
Scores updated daily from GitHub, PyPI, and npm data. How scores work