daedalus/mcp_reverse_engineering
MCP reverse engineering tools
Platform-specific configuration:
{
"mcpServers": {
"mcp_reverse_engineering": {
"command": "npx",
"args": [
"-y",
"mcp_reverse_engineering"
]
}
}
}Add the config above to .claude/settings.json under the mcpServers key.
A sandboxed MCP (Managed Computation Platform) tool for reverse engineering that provides a unified interface to various reverse engineering tools with security restrictions.
file, strings, hexdump, xxdobjdump, readelf, ldd, strace, ltrace, upx, gdb, radare2, angr, ghidra, fridabinwalk, unsquashfs, sasquatch, jefferson, ubi_reader, unpackers, retdc, qemucurl, wgetpip install -e .Tools are configured via YAML files to control which tools are loaded. This prevents overwhelming LLM context windows by enabling only the tools you need.
Default config (tools_config.yaml): All tools disabled
Example configs:
examples/minimal.yaml - Only file analysis tools (3 tools)examples/firmware.yaml - File + Binary + Firmware analysisexamples/full.yaml - All 25 tools enabled# Enable specific tool categories
settings:
default_timeout: 300
categories:
file_analysis:
enabled: true
tools:
- file
Loading reviews...