sjkim1127/Reversecore_MCP
A security-first MCP server empowering AI agents to orchestrate Ghidra, Radare2, and YARA for automated reverse engineering.
Implements a FastMCP-based stdio transport with connection pooling for Radare2 and automatic Ghidra-to-r2 fallback strategies, while providing specialized malware analysis features like dormant threat detection, IOC extraction, and adaptive vaccine generation. Integrates with MCP clients (Cursor, Claude Desktop) via Docker containers with workspace mounting, includes 700+ unit tests and a web dashboard for standalone binary analysis without LLM dependencies.
Stars
49
Forks
8
Language
Python
License
MIT
Category
Last pushed
Mar 05, 2026
Commits (30d)
0
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/mcp/sjkim1127/Reversecore_MCP"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Higher-rated alternatives
mrexodia/ida-pro-mcp
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
cyberkaida/reverse-engineering-assistant
MCP server for reverse engineering tasks in Ghidra 👩💻
symgraph/GhidrAssistMCP
An MCP extension for Ghidra
soth-ai/mcp-reticle
Reticle intercepts, visualizes, and profiles JSON-RPC traffic between your LLM and MCP servers...
x42en/sysplant
Your Windows syscall hooking factory - feat Canterlot's Gate - All accessible over MCP