ReVa (Reverse Engineering Assistant)
by cyberkaida
AI-powered Ghidra MCP server for binary analysis, decompilation and automated reverse engineering tasks.
What it does
ReVa integrates Ghidra's powerful reverse engineering suite with LLMs via the Model Context Protocol. It enables AI models to interact directly with binaries, providing structured fragments of decompilation and cross-references to minimize context rot and hallucination during long-form analysis.
Tools
- Decompilation Analysis: Extracts and analyzes function logic from Ghidra.
- String Analysis: Identifies and examines interesting strings in the binary.
- Cross-Reference Exploration: Navigates function calls and data references to map program flow.
- Binary Triage: Rapidly identifies high-level program structure and shared library relationships.
- CTF Assistant: Generates pwntools scripts and identifies vulnerabilities for capture-the-flag challenges.
Installation
Install the ReVa Ghidra extension via the Ghidra extension manager or build from source. Once installed, activate the "ReVa Application Plugin" in Project settings and the "ReVa Plugin" in Code Browser settings.
For Claude Desktop, add the following to claude_desktop_config.json:
{
"mcpServers": {
"ReVa": {
"url": "http://localhost:8080/mcp/message"
}
}
}
Supported hosts
Confirmed for Claude Desktop, Claude Code, and VS Code Copilot.
Quick install
claude mcp add --scope user --transport http ReVa -- http://localhost:8080/mcp/messageInformation
- Pricing
- free
- Published






