01Explore imports, exports, and memory layouts
02Locate potentially obfuscated strings
03Get AI-assisted insights about potential security vulnerabilities
04Generate call graphs to understand execution flow
052 GitHub stars
06Connect AI assistants to Ghidra via the Model Context Protocol
07Identify potential sources of user input in the binary
08Ask questions about binaries in plain English
09Detect cryptographic implementations in the binary
10Retrieve detailed function information and decompiled code
11Extract API calls from a function for security analysis