Ghidra MCP server designed for LLMs — small, focused tools that reduce hallucinations in binary analysis sessions.
ReVa (Reverse Engineering Assistant) is a Ghidra 12.0+ extension implementing an MCP server with a tool-driven approach designed for effective LLM interaction. It uses small, focused tools (decompilation, renaming, type fixing, xrefs, string analysis) to limit context degradation during extended sessions. Supports interactive mode (with Ghidra UI) and headless automation, and includes Claude Code plugins for binary triage, crypto analysis, and CTF guides.
Cuándo usarlo: You have a binary to quickly assess before committing to deep analysis.
Requisitos previos
Ghidra 12.0+ with ReVa installed — Download release, install via Ghidra extension manager
MCP client configured — Claude Code or VSCode connected to ReVa's MCP endpoint
Flujo
Initial triage
Load this binary and give me a quick triage: what platform, what language, key functions, interesting strings, and imported libraries.✓ Copiado
→ Concise triage report with platform, language hints, notable functions and strings
Focus on suspicious functions
Decompile the functions that reference network or crypto strings. What are they doing?✓ Copiado
→ Decompiled code with focused analysis
Resultado: A quick assessment of the binary's purpose and suspicious functionality.
Errores comunes
Asking too broad questions causes context degradation — ReVa's small tools are designed for focused queries — ask specific questions about specific functions
Cross-reference binary with source code from related open-source projects
This binary seems to use libcurl. Search GitHub for the version and compare the function signatures.✓ Copiado
Herramientas
Lo que expone este MCP
Herramienta
Entradas
Cuándo llamar
Coste
decompile_function
function_name_or_address: str
Decompile a specific function
0
rename_variable
function: str, old_name: str, new_name: str
Rename a variable for clarity
0
fix_type
variable: str, type: str
Set the correct type for a variable
0
get_xrefs
address: str
Find cross-references to an address
0
search_strings
pattern: str
Search for strings in the binary
0
Coste y límites
Lo que cuesta ejecutarlo
Cuota de API
N/A — fully local
Tokens por llamada
200–1500 tokens per tool call
Monetario
Free — both Ghidra and ReVa are open source
Consejo
Use focused queries on specific functions rather than broad 'analyze everything' requests.
Seguridad
Permisos, secretos, alcance
Almacenamiento de credenciales: N/A
Salida de datos: All analysis is local
⚠ This tool is designed for authorized security research, CTF competitions, and defensive analysis only. Do not use it against systems you don't own or have written authorization to test.
Only analyze binaries you have legal right to reverse engineer.
Resolución de problemas
Errores comunes y soluciones
Plugin not loading
ReVa requires Ghidra 12.0+. Enable the plugin in both Project view and Code Browser tool settings.
Verificar: Check Ghidra's plugin configuration for 'ReVa'
Headless mode not working
Ensure you built ReVa with headless support. Check the headless Ghidra documentation for proper setup.
Verificar: Run analyzeHeadless with ReVa arguments
Context degradation in long sessions
ReVa is designed to minimize this, but start a new session if analysis quality drops.
Verificar: Try the same question in a fresh session
Alternativas
reverse-engineering-assistant vs otros
Alternativa
Cuándo usarla
Contrapartida
GhidrAssistMCP
You want more tools (35 vs ReVa's smaller set) and consolidated action-based APIs
More tools but potentially more context pollution for LLMs