https://github.com/evilsocket/ghidra-re
An AI agent to use Ghidra with any AI.
https://github.com/evilsocket/ghidra-re
Last synced: 10 months ago
JSON representation
An AI agent to use Ghidra with any AI.
- Host: GitHub
- URL: https://github.com/evilsocket/ghidra-re
- Owner: evilsocket
- License: other
- Created: 2025-03-29T18:25:21.000Z (11 months ago)
- Default Branch: main
- Last Pushed: 2025-03-31T09:33:48.000Z (11 months ago)
- Last Synced: 2025-04-22T22:17:55.836Z (10 months ago)
- Size: 27.3 KB
- Stars: 18
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
**ghidra-re** is a [Nerve](https://github.com/evilsocket/nerve) agent that uses [this Ghidra MCP server](https://github.com/LaurieWired/GhidraMCP) to reverse a target binary with Ghidra.
Make sure the Ghidra MCP server [is installed correctly](https://github.com/LaurieWired/GhidraMCP?tab=readme-ov-file#installation) and copy its `bridge_mcp_ghidra.py` script in `/usr/local/bin` (you can change this path in `agent.yml`).
Install the agent (requires nerve >= 1.4.x):
```bash
# this will download and install (or update) to ~/.nerve/agents
nerve install evilsocket/ghidra-re
```
By default it will analyze the currently open binary:
```bash
# interactive mode
nerve run ghidra-re -i
# specific task
nerve run ghidra-re --task 'what is the function sub_00000 about?'
```