Why this server?
This server directly addresses 'reverse engineer binaries' and 'applications' using Ghidra, a powerful tool for decompilation and analysis, which is highly relevant for macOS binary files.
-securityAlicense-qualityEnables LLMs to autonomously reverse engineer binaries using Ghidra's capabilities including decompilation, function analysis, automatic renaming, and BSim integration for function similarity matching.Last updatedAGPL 3.0Why this server?
This server provides AI-assisted reverse engineering with Binary Ninja, offering comprehensive binary analysis and decompilation, which is suitable for macOS applications and binaries.
-securityAlicense-qualityEnables AI-assisted reverse engineering by bridging Binary Ninja with Large Language Models through 40+ analysis tools. Provides comprehensive binary analysis capabilities including decompilation, symbol management, type analysis, and documentation generation through natural language interactions.Last updated31MITWhy this server?
This server enables autonomous reverse engineering through Cutter, allowing decompilation and code analysis of binaries, which is applicable to macOS binary files.
Why this server?
This server integrates with the Hopper disassembler, a tool very popular on macOS for analyzing binary files, disassembling procedures, and performing reverse engineering tasks, including decompilation.
-securityAlicense-qualityA FastMCP server plugin for the Hopper disassembler that enables AI assistants to analyze binary files, disassemble procedures, generate call graphs, search strings, and manage reverse engineering tasks. Provides comprehensive binary analysis capabilities including decompilation, annotation tools, and reference tracking through natural language interactions.Last updated57MITWhy this server?
This server allows LLMs to interact with Binary Ninja for reverse engineering tasks like viewing assembly and decompiled code, which is highly relevant for analyzing macOS binaries and applications.
-securityAlicense-qualityA Model Context Protocol server that enables Large Language Models to interact with Binary Ninja for reverse engineering tasks like viewing assembly code, decompiled code, renaming functions, and adding comments.Last updated3MITWhy this server?
This server enables interaction with IDA Pro, a leading reverse engineering tool for tasks like decompilation and disassembly, making it very suitable for analyzing macOS binary files.
Why this server?
While named 'Game Hacking,' this server utilizes Frida for reverse engineering, memory scanning, and code injection, which is a powerful dynamic analysis technique applicable to macOS applications.
AsecurityAlicense-qualityProvides Cheat Engine-like capabilities for game hacking and reverse engineering through Frida, enabling memory scanning, value modification, pattern matching, function hooking, and code injection across processes.Last updated4254MITWhy this server?
This server uses Detect It Easy (DIE) to analyze executable files, detect packers, and gather forensic information, which is a crucial first step in reverse engineering any binary, including those on macOS.
-securityAlicense-qualityAn MCP server that enables AI agents to analyze executable files using Detect It Easy (DIE), providing capabilities to examine file structures, detect packers, compilers, and gather other forensic information.Last updated11MITWhy this server?
Another instance of a Ghidra integration, providing core reverse engineering functionality like decompiling binaries and analyzing code structure, which is directly applicable to macOS applications.