Ghidra MCP server designed for LLMs — small, focused tools that reduce hallucinations in binary analysis sessions.
ReVa (Reverse Engineering Assistant) is a Ghidra 12.0+ extension implementing an MCP server with a tool-driven approach designed for effective LLM interaction. It uses small, focused tools (decompilation, renaming, type fixing, xrefs, string analysis) to limit context degradation during extended sessions. Supports interactive mode (with Ghidra UI) and headless automation, and includes Claude Code plugins for binary triage, crypto analysis, and CTF guides.
Когда использовать: You have a binary to quickly assess before committing to deep analysis.
Предварительные требования
Ghidra 12.0+ with ReVa installed — Download release, install via Ghidra extension manager
MCP client configured — Claude Code or VSCode connected to ReVa's MCP endpoint
Поток
Initial triage
Load this binary and give me a quick triage: what platform, what language, key functions, interesting strings, and imported libraries.✓ Скопировано
→ Concise triage report with platform, language hints, notable functions and strings
Focus on suspicious functions
Decompile the functions that reference network or crypto strings. What are they doing?✓ Скопировано
→ Decompiled code with focused analysis
Итог: A quick assessment of the binary's purpose and suspicious functionality.
Подводные камни
Asking too broad questions causes context degradation — ReVa's small tools are designed for focused queries — ask specific questions about specific functions
Cross-reference binary with source code from related open-source projects
This binary seems to use libcurl. Search GitHub for the version and compare the function signatures.✓ Скопировано
Инструменты
Что предоставляет этот MCP
Инструмент
Входные данные
Когда вызывать
Стоимость
decompile_function
function_name_or_address: str
Decompile a specific function
0
rename_variable
function: str, old_name: str, new_name: str
Rename a variable for clarity
0
fix_type
variable: str, type: str
Set the correct type for a variable
0
get_xrefs
address: str
Find cross-references to an address
0
search_strings
pattern: str
Search for strings in the binary
0
Стоимость и лимиты
Во что обходится
Квота API
N/A — fully local
Токенов на вызов
200–1500 tokens per tool call
Деньги
Free — both Ghidra and ReVa are open source
Совет
Use focused queries on specific functions rather than broad 'analyze everything' requests.
Безопасность
Права, секреты, радиус поражения
Хранение учётных данных: N/A
Исходящий трафик: All analysis is local
⚠ This tool is designed for authorized security research, CTF competitions, and defensive analysis only. Do not use it against systems you don't own or have written authorization to test.
Only analyze binaries you have legal right to reverse engineer.
Устранение неполадок
Частые ошибки и исправления
Plugin not loading
ReVa requires Ghidra 12.0+. Enable the plugin in both Project view and Code Browser tool settings.
Проверить: Check Ghidra's plugin configuration for 'ReVa'
Headless mode not working
Ensure you built ReVa with headless support. Check the headless Ghidra documentation for proper setup.
Проверить: Run analyzeHeadless with ReVa arguments
Context degradation in long sessions
ReVa is designed to minimize this, but start a new session if analysis quality drops.
Проверить: Try the same question in a fresh session
Альтернативы
reverse-engineering-assistant в сравнении
Альтернатива
Когда использовать
Компромисс
GhidrAssistMCP
You want more tools (35 vs ReVa's smaller set) and consolidated action-based APIs
More tools but potentially more context pollution for LLMs