Ghidra MCP server designed for LLMs — small, focused tools that reduce hallucinations in binary analysis sessions.
ReVa (Reverse Engineering Assistant) is a Ghidra 12.0+ extension implementing an MCP server with a tool-driven approach designed for effective LLM interaction. It uses small, focused tools (decompilation, renaming, type fixing, xrefs, string analysis) to limit context degradation during extended sessions. Supports interactive mode (with Ghidra UI) and headless automation, and includes Claude Code plugins for binary triage, crypto analysis, and CTF guides.
Wann einsetzen: You have a binary to quickly assess before committing to deep analysis.
Voraussetzungen
Ghidra 12.0+ with ReVa installed — Download release, install via Ghidra extension manager
MCP client configured — Claude Code or VSCode connected to ReVa's MCP endpoint
Ablauf
Initial triage
Load this binary and give me a quick triage: what platform, what language, key functions, interesting strings, and imported libraries.✓ Kopiert
→ Concise triage report with platform, language hints, notable functions and strings
Focus on suspicious functions
Decompile the functions that reference network or crypto strings. What are they doing?✓ Kopiert
→ Decompiled code with focused analysis
Ergebnis: A quick assessment of the binary's purpose and suspicious functionality.
Fallstricke
Asking too broad questions causes context degradation — ReVa's small tools are designed for focused queries — ask specific questions about specific functions
Cross-reference binary with source code from related open-source projects
This binary seems to use libcurl. Search GitHub for the version and compare the function signatures.✓ Kopiert
Werkzeuge
Was dieses MCP bereitstellt
Werkzeug
Eingaben
Wann aufrufen
Kosten
decompile_function
function_name_or_address: str
Decompile a specific function
0
rename_variable
function: str, old_name: str, new_name: str
Rename a variable for clarity
0
fix_type
variable: str, type: str
Set the correct type for a variable
0
get_xrefs
address: str
Find cross-references to an address
0
search_strings
pattern: str
Search for strings in the binary
0
Kosten & Limits
Was der Betrieb kostet
API-Kontingent
N/A — fully local
Tokens pro Aufruf
200–1500 tokens per tool call
Kosten in €
Free — both Ghidra and ReVa are open source
Tipp
Use focused queries on specific functions rather than broad 'analyze everything' requests.
Sicherheit
Rechte, Secrets, Reichweite
Credential-Speicherung: N/A
Datenabfluss: All analysis is local
⚠ This tool is designed for authorized security research, CTF competitions, and defensive analysis only. Do not use it against systems you don't own or have written authorization to test.
Only analyze binaries you have legal right to reverse engineer.
Fehlerbehebung
Häufige Fehler und Lösungen
Plugin not loading
ReVa requires Ghidra 12.0+. Enable the plugin in both Project view and Code Browser tool settings.
Prüfen: Check Ghidra's plugin configuration for 'ReVa'
Headless mode not working
Ensure you built ReVa with headless support. Check the headless Ghidra documentation for proper setup.
Prüfen: Run analyzeHeadless with ReVa arguments
Context degradation in long sessions
ReVa is designed to minimize this, but start a new session if analysis quality drops.
Prüfen: Try the same question in a fresh session
Alternativen
reverse-engineering-assistant vs. andere
Alternative
Wann stattdessen
Kompromiss
GhidrAssistMCP
You want more tools (35 vs ReVa's smaller set) and consolidated action-based APIs
More tools but potentially more context pollution for LLMs