Ghidra MCP server designed for LLMs — small, focused tools that reduce hallucinations in binary analysis sessions.
ReVa (Reverse Engineering Assistant) is a Ghidra 12.0+ extension implementing an MCP server with a tool-driven approach designed for effective LLM interaction. It uses small, focused tools (decompilation, renaming, type fixing, xrefs, string analysis) to limit context degradation during extended sessions. Supports interactive mode (with Ghidra UI) and headless automation, and includes Claude Code plugins for binary triage, crypto analysis, and CTF guides.
Quando usar: You have a binary to quickly assess before committing to deep analysis.
Pré-requisitos
Ghidra 12.0+ with ReVa installed — Download release, install via Ghidra extension manager
MCP client configured — Claude Code or VSCode connected to ReVa's MCP endpoint
Fluxo
Initial triage
Load this binary and give me a quick triage: what platform, what language, key functions, interesting strings, and imported libraries.✓ Copiado
→ Concise triage report with platform, language hints, notable functions and strings
Focus on suspicious functions
Decompile the functions that reference network or crypto strings. What are they doing?✓ Copiado
→ Decompiled code with focused analysis
Resultado: A quick assessment of the binary's purpose and suspicious functionality.
Armadilhas
Asking too broad questions causes context degradation — ReVa's small tools are designed for focused queries — ask specific questions about specific functions
Cross-reference binary with source code from related open-source projects
This binary seems to use libcurl. Search GitHub for the version and compare the function signatures.✓ Copiado
Ferramentas
O que este MCP expõe
Ferramenta
Entradas
Quando chamar
Custo
decompile_function
function_name_or_address: str
Decompile a specific function
0
rename_variable
function: str, old_name: str, new_name: str
Rename a variable for clarity
0
fix_type
variable: str, type: str
Set the correct type for a variable
0
get_xrefs
address: str
Find cross-references to an address
0
search_strings
pattern: str
Search for strings in the binary
0
Custo e limites
O que custa rodar
Cota de API
N/A — fully local
Tokens por chamada
200–1500 tokens per tool call
Monetário
Free — both Ghidra and ReVa are open source
Dica
Use focused queries on specific functions rather than broad 'analyze everything' requests.
Segurança
Permissões, segredos, alcance
Armazenamento de credenciais: N/A
Saída de dados: All analysis is local
⚠ This tool is designed for authorized security research, CTF competitions, and defensive analysis only. Do not use it against systems you don't own or have written authorization to test.
Only analyze binaries you have legal right to reverse engineer.
Solução de problemas
Erros comuns e correções
Plugin not loading
ReVa requires Ghidra 12.0+. Enable the plugin in both Project view and Code Browser tool settings.
Verificar: Check Ghidra's plugin configuration for 'ReVa'
Headless mode not working
Ensure you built ReVa with headless support. Check the headless Ghidra documentation for proper setup.
Verificar: Run analyzeHeadless with ReVa arguments
Context degradation in long sessions
ReVa is designed to minimize this, but start a new session if analysis quality drops.
Verificar: Try the same question in a fresh session
Alternativas
reverse-engineering-assistant vs. outros
Alternativa
Quando usar
Troca
GhidrAssistMCP
You want more tools (35 vs ReVa's smaller set) and consolidated action-based APIs
More tools but potentially more context pollution for LLMs