Binary Ninja MCP provides a bridge between the Binary Ninja reverse engineering platform and large language models through a HTTP server that exposes binary analysis capabilities. The plugin enables users to perform tasks like listing functions, decompiling code, renaming symbols, and analyzing binary structures directly through LLM interfaces. Built with Python 3.12, it features a modular architecture with separate components for binary operations, API endpoints, and server management. The implementation is particularly optimized for Claude Desktop integration, allowing reverse engineers to leverage AI assistance for complex binary analysis workflows without leaving their development environment.
No reviews yet. Be the first to review!
Sign in to join the conversation
Get the current status of the loaded binary.
List all namespace/class names in the program.
List defined data labels and their values.
List exported functions/symbols.
List imported symbols in the program.
List all function names in the program.
List all non-global namespaces in the program.
List all memory segments in the program.
Rename a data label at the specified address.
Rename a function by its current name to a new user-defined name.
Search for functions whose name contains the given substring.
Decompile a specific function by name and return the decompiled C code.
Set a comment at a specific address.
Set a comment for a function.
Get the comment at a specific address.
Get the comment for a function.
Delete the comment at a specific address.
Delete the comment for a function.
Get the assembly representation of a function by name or address.
Retrieve the name of the function the address belongs to.
Retrieve names and addresses of functions that call the given function.
Retrieve definition of a user-defined type (struct, enumeration, typedef, union).
Rename variable inside a given function.
Retype variable inside a given function.
Add type definitions from a C string type definition.
Edit signature of a given function, given as a type string.