npx claudepluginhub plurigrid/asi --plugin asiThis skill uses the workspace's default tool permissions.
---
Analyzes binaries via MCP servers for Ghidra, IDA Pro, radare2. Handles disassembly, decompilation, function analysis, xrefs for malware, vulnerabilities, CTFs.
Performs deep static binary analysis using radare2 and Ghidra for function enumeration, disassembly, decompilation, xrefs, and control flow graphs. Use for reverse engineering binaries without execution.
Performs binary reverse engineering: disassembly, decompilation, executable analysis, protocol extraction, vulnerability research using IDA Pro, Ghidra, radare2, x64dbg. For CTF challenges, security research, undocumented software.
Share bugs, ideas, or general feedback.
radare2-mcp provides an MCP server enabling Claude and other AI assistants to perform binary analysis using radare2.
# Via r2pm (radare2 package manager)
r2pm -Uci r2mcp
Edit ~/Library/Application Support/Claude/claude_desktop_config.json:
{
"mcpServers": {
"radare2": {
"command": "r2pm",
"args": ["-r", "r2mcp"]
}
}
}
docker build -t r2mcp .
{
"mcpServers": {
"radare2": {
"command": "docker",
"args": ["run", "--rm", "-i", "-v", "/tmp/data:/data", "r2mcp"]
}
}
}
The server exposes radare2 analysis via MCP:
open_file - Open binary for analysisanalyze - Run analysis at depth levels 0-4decompile_function - Get C-like pseudocodelist_functions - Enumerate discovered functionslist_strings - Extract strings from binaryxrefs_to - Find cross-referencesrun_command - Execute raw r2 commands# Rec2020 wide gamut learning
gay_seed!(0xe72b09cb7aebe913)
# Forward mode autodiff
∂params = Enzyme.gradient(Forward, loss, params, seed)
0xe72b09cb7aebe913radare2-hatchery (-1) ⊗ mcp-builder (0) ⊗ gay-mcp (+1) = 0 ✓
mcp-builder - MCP server developmentblackhat-go - Security techniquestree-sitter - AST-based code analysis