Skip to content

Crimson7research/ReverseEngineering-AI

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Reverse Engineering in the Age of AI

This repository showcases the power of artificial intelligence as a tool to improve reverse engineering of applications. It contains a CTF-style reverse engineering challenge and the AI-powered tooling used to solve it.

Repository Structure

Directory Description
challenge/ The CTF challenge: a statically-linked C++ binary with XOR-encrypted shellcode that validates a secret flag at runtime. Includes source, build system, and tooling scripts.
ai-workdir/ AI workspace for solving the challenge using Claude Code with a Ghidra integration. Contains the /analyze-binary command and a writeup directory.
ghidra-mcp/ Dockerized MCP server that bridges Claude Code to a running Ghidra instance via the GhidraMCP plugin. Pre-built images available on GHCR.
.github/ CI/CD workflows (daily build of the Ghidra MCP Docker image).

Quick Start

1. Build the challenge

cd challenge
cmake -B build -S .
cmake --build build

2. Install the GhidraMCP plugin in Ghidra

Follow the installation steps in the GhidraMCP releases page to install the plugin into Ghidra 12.0.x.

3. Set up the Ghidra MCP bridge

docker pull ghcr.io/crimson7research/ghidra-mcp:latest
claude mcp add ghidra-mcp -t stdio -- docker run --rm -i --network host ghcr.io/crimson7research/ghidra-mcp

4. Analyze with AI

  1. Open the built binary in Ghidra (with the GhidraMCP plugin installed)
  2. Open Claude Code in the ai-workdir/ directory
  3. Run the /analyze-binary command

See the READMEs in each subdirectory for detailed instructions.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Packages

 
 
 

Contributors