by blacktop
Headless IDA Pro MCP Server
# Add to your Claude Code skills
git clone https://github.com/blacktop/ida-mcp-rsHeadless IDA Pro MCP server for AI-powered reverse engineering.
macOS (via Homebrew)
brew install blacktop/tap/ida-mcp
Linux / Windows
Download the latest binary for your platform from GitHub Releases.
Build from source
See docs/BUILDING.md.
Standard IDA installations in /Applications work automatically:
claude mcp add ida -- ida-mcp
If you see Library not loaded: @rpath/libida.dylib, set DYLD_LIBRARY_PATH to your IDA path:
claude mcp add ida -e DYLD_LIBRARY_PATH='/path/to/IDA.app/Contents/MacOS' -- ida-mcp
Supported paths (auto-detected):
/Applications/IDA Professional 9.3.app/Contents/MacOS/Applications/IDA Home 9.3.app/Contents/MacOS/Applications/IDA Essential 9.3.app/Contents/MacOS/Applications/IDA Professional 9.2.app/Contents/MacOSStandard IDA installations are auto-detected:
claude mcp add ida -- ida-mcp
If you see library loading errors, set IDADIR:
No comments yet. Be the first to share your thoughts!
claude mcp add ida -e IDADIR='/path/to/ida' -- ida-mcp
Supported paths (auto-detected):
/opt/idapro-9.3, /opt/idapro-9.2$HOME/idapro-9.3, $HOME/idapro-9.2/usr/local/idapro-9.3, /usr/local/idapro-9.2Add your IDA directory to PATH (System Properties > Environment Variables):
$env:PATH = "C:\Program Files\IDA Professional 9.3;$env:PATH"
claude mcp add ida -- ida-mcp
Common Windows IDA paths:
C:\Program Files\IDA Professional 9.3C:\Program Files\IDA Home 9.3The binary links against IDA's libraries at runtime. Standard installation paths are auto-detected via baked RPATHs. For non-standard paths:
| Platform | Library | Fallback Configuration |
|----------|---------|------------------------|
| macOS | libida.dylib | DYLD_LIBRARY_PATH |
| Linux | libida.so | IDADIR or LD_LIBRARY_PATH |
| Windows | ida.dll | Add IDA dir to PATH |
claude mcp add ida -- ida-mcp
codex mcp add ida -- ida-mcp
gemini mcp add ida -- ida-mcp
Add to .cursor/mcp.json:
{
"mcpServers": {
"ida": { "command": "ida-mcp" }
}
}
Once configured, you can analyze binaries through your AI agent:
# Open a binary (IDA analyzes raw binaries automatically)
open_idb(path: "~/samples/malware")
# Discover available tools
tool_catalog(query: "find callers")
# List functions
list_functions(limit: 20)
# Disassemble by name
disasm_by_name(name: "main", count...