Analyze binary files using reverse engineering tools like gdb, radare2, or ghidra to examine code structure and behavior.
108,518 tools. Last updated 2026-04-16 14:59
- Export binary analysis context from Ghidra headless decompilation for reverse-engineering functions, pseudocode, structs, and enums.
- Transform prompts using engineering best practices to improve clarity and effectiveness for AI assistants.
- Set a software breakpoint at a memory address to execute JavaScript code when triggered, enabling game debugging and reverse engineering.MIT
- Search a community-verified database for engineering fixes to software errors, vehicles, home systems, and appliances using error messages or symptoms.MIT
- Send tasks to an autonomous agent that handles complex software engineering work, including file operations, shell commands, codebase searches, and end-to-end project execution.ISC
Matching MCP Servers
- -securityAlicense-qualityModel Context Protocol server for Ghidra reverse engineering. 179 tools for decompilation, symbol management, cross-references, and binary analysis.Last updated1,553Apache 2.0
- -securityFlicense-qualityA headless Ghidra server that enables AI agents to perform deep reverse-engineering tasks such as disassembly, decompilation, and patching via the Model Context Protocol. It supports extensive automation of analysis workflows in sandboxed environments through a catalog of over 200 specialized tools.Last updated54
Matching MCP Connectors
- MCP for YNABOAuth
Connect YNAB to AI assistants like ChatGPT and Claude via a hosted remote MCP server with OAuth. Provides tools for reading budgets, accounts, categories, transactions, analyzing spending patterns, forecasting cash flow, tracking goal progress, and managing funds — all after signing in with your own YNAB account.
Independent AI consulting — services, dispatches, cairns, and 40-year client history.