Skip to main content
Glama

Reverse engineering macOS binary files and applications MCP tools

Production-ready MCP servers that extend AI capabilities through file access, database connections, APIs, and contextual services.

45,306 tools. Last updated 2025-12-19 08:17
  • Apply structured debugging methods like Binary Search, Reverse Engineering, or Divide and Conquer to systematically identify and resolve technical issues. Enhances problem-solving efficiency with clear, step-by-step approaches.
  • Extract and list embedded strings from binary files for reverse engineering and analysis with IDA Pro MCP Server integration.
    MIT License
  • Extract and list all enum names from a loaded binary using Ghidra for efficient reverse-engineering and binary analysis.
  • Extract and list all function names from a loaded binary using the Ghidra MCP Server, enabling efficient binary analysis and reverse-engineering workflows.
  • Export binary context using Ghidra in headless mode. Extracts functions, pseudocode, structs, and enums for reverse-engineering analysis.

Interested in MCP?

Join the MCP community for support and updates.

RedditDiscord

Matching MCP servers