Bridges Claude Desktop or any MCP client directly into Ghidra's reverse engineering API through a Go bridge and Java plugin. You get 70 tools covering decompilation, symbol renaming, xref analysis, structure creation, malware triage, and ROP gadget searches. The plugin auto-starts a local TCP server, handles multi-instance Ghidra setups via port routing, and supports async decompilation for large functions. Includes pagination for heavy queries, optional API key auth, and automated Claude Desktop config generation. Useful when you want natural language queries over binaries instead of clicking through Ghidra's GUI, or when automating security analysis workflows that need both AI reasoning and low-level program data.
claude mcp add --transport stdio 13bm-ghidramcp uvx ghidramcp