Help us improve
Share bugs, ideas, or general feedback.
Share bugs, ideas, or general feedback.
Share bugs, ideas, or general feedback.
By mrexodia
Reverse engineer binaries by querying IDA Pro's disassembly, decompilation, and type system through natural language, enabling AI-assisted analysis of functions, cross-references, segments, and database state.
npx claudepluginhub mrexodia/claude-marketplace --plugin ida-pro-mcpAdmin access level
Server config contains admin-level keywords
Share bugs, ideas, or general feedback.
Based on adoption, maintenance, documentation, and repository signals. Not a security audit or endorsement.
SQL interface to IDA Pro databases for querying and CRUD operations on functions, xrefs, strings, and decompiled code
Reverse engineer binaries using Ghidra's headless analyzer. Decompile executables, extract functions, strings, symbols, and analyze call graphs without GUI.
(Unsafe) Skills, knowledge, and scripts for reverse engineering with IDA Pro. Autonomously writes and executes IDA Domain scripts to analyze binaries, extract functions, decompile code, and automate any reverse engineering task.
Binary reverse engineering, malware analysis, firmware security, and software protection research for authorized security research, CTF competitions, and defensive security
Claude Code skills for x64dbg debugger automation — state snapshots, memory analysis, and more
Binary analysis skills for VulHunt MCP - decompilation, dataflow analysis, pattern matching, and more
Own this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claimOwn this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claim