Ai And Mcp For Reverse Engineering
Published 9/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 9.04 GB | Duration: 11h 58m
Published 9/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 9.04 GB | Duration: 11h 58m
AI assisted reversing by integrating LLMs with tools via Model Context Protocol (MCP) to automate & accelerate analysis
What you'll learn
What Model Context Protocol (MCP) is
How to enable AI integration in reverse engineering and debugging
How to connect LLM-based AI hosts to your debugging, disassembly, and decompiling tools and workflows
Prompt engineering and context structuring techniques for reverse engineering tasks
Real-world use cases where AI significantly enhances reverse engineering, debugging, and static analysis
Vibe coding your MCP tools
Create your own MCP server
Use cloud-based LLM and also run LLM locally for reverse engineering
Run Windows-based LLM and also Linux-based LLM
MCP servers for x64dbg, dnSpy, Cutter, IDA Pro and more
Run MCP server in virtual machine and access from the host machine
Create your own Crackmes for testing
Use Claude Desktop, 5ire and LM Studio for MCP integration
Run your own LLM models using LM Studio for Inferencing
Using OpenAI API for LLM
AI-assisted reverse engineering of x86 and x64 windows and Linux binaries
and more. . .
Requirements
A basic understanding of reverse engineering or low-level programming
Familiarity with tools like debuggers, disassemblers, or decompilers (helpful but not mandatory)
Curiosity and openness to experiment with AI in technical workflows
Description
Unlock the power of AI in reverse engineering and binary analysis with Model Context Protocol (MCP).In this course, you’ll learn how to integrate Large Language Models (LLMs) into your reverse engineering workflow using the Model Context Protocol (MCP) — a cutting-edge framework designed to connect AI hosts with your debugging, disassembly, and decompiling tools.Inspired by the rise of Vibe Coding—a modern trend focused on fluid, creative, AI-enhanced development—this course brings the same philosophy to the world of reverse engineering. Welcome to AI and MCP for Reverse Engineering: a smarter, more intuitive way to analyze, automate, and understand complex binaries with the help of AI.Whether you're working in malware analysis, vulnerability research, ethical hacking, or software protection, this course will show you how to leverage AI to automate repetitive tasks, gain intelligent insights, and streamline both static and dynamic analysis.AI-Driven Debugging and Analysis: Enhancing reverse engineering skills with AIYou’ll explore how AI can support reverse engineering, static and dynamic analysis for Windows and Linux.What You’ll LearnWhat Model Context Protocol (MCP) is and how it enables AI integration in reverse engineering and debuggingHow to connect LLM-based AI hosts to your debugging, disassembly, and decompiling tools and workflowsPrompt engineering and context structuring techniques for reverse engineering tasksAI-assisted reverse engineering for windows x86, x64 and Linux binariesUse cloud-based AI Agents as well as run LLM locally for reverse engineeringVibe-coding your own MCP toolsWho This Course Is ForReverse engineers and malware analysts looking to increase productivity with AIEthical hackers and penetration testers exploring automation with LLMsCybersecurity professionals interested in practical AI integrationDevelopers, researchers, and learners curious about applying AI to binary analysisPrerequisitesA basic understanding of reverse engineering or low-level programmingFamiliarity with tools like debuggers, disassemblers, or decompilers (helpful but not mandatory)Curiosity and openness to experiment with AI in technical workflowsWhy Take This Course?AI and LLMs are rapidly transforming the field of reverse engineering and debugging. With the Model Context Protocol as your bridge, you can plug powerful AI hosts into your environment and achieve deeper insights with less manual effort. Whether you're analyzing malware, reversing binaries, debugging protected applications, or decompiling complex binaries, this course equips you with the hands-on skills to make AI your trusted assistant in technical analysis.And now, with AI and MCP for Reverse Engineering, you're not just learning to reverse — you're learning to reverse with clarity, creativity, and intelligent flow.Enroll now and I will see you inside!
Overview
Section 1: MCP Basics
Lecture 1 Introduction
Lecture 2 Introduction to MCP
Lecture 3 Installing the Supporting Tools
Lecture 4 Installing the Host UI
Lecture 5 Stdio and http protocols and json configuration files
Section 2: AI and MCP for x64dbg debugger
Lecture 6 x64dbg configuration using http with mcp-remote (AgentSmither's MCP)
Lecture 7 Using AI to find secret code from an exe
Lecture 8 x64dbg configuration using stdio protocol (Wasdubya MCP)
Lecture 9 Using AI with an interactive exe
Section 3: Create crackmes for MCP studies
Lecture 10 Intro to creating crackmes
Lecture 11 Installing Dev-C++
Lecture 12 Build your own crackme
Section 4: x64dbg-automate
Lecture 13 Intro to x64dbg-automate
Lecture 14 Installing x64dbg-automate
Section 5: MCP Workspace and MCP Coding Conventions
Lecture 15 Install Visual Studio Code and Python Extensions
Lecture 16 Create a "Hello World" program using MCP coding conventions
Section 6: Converting basic code into MCP servers
Lecture 17 Convert basic python code into MCP server
Lecture 18 Connecting MCP servers to AI agents
Section 7: Session Control: select debugger
Lecture 19 Select debugger function - Part 1
Lecture 20 Select debugger function - Part 2
Section 8: Session Control: start, detach, terminate, attach and get register
Lecture 21 Start session function
Lecture 22 Detach session function
Lecture 23 Terminate session function
Lecture 24 Attach session and get register functions
Section 9: Operations on x32 and x64 registers
Lecture 25 Dumping x32 and x64 registers
Lecture 26 Setting x32 and x64 registers
Lecture 27 Getting symbols
Lecture 28 Calculate memory addresses using eval sync
Section 10: Create x32 and x64 GUI-based crackmes for MCP studies
Lecture 29 Intro to building your own gui-based crackmes
Lecture 30 Installing C++ Builder
Lecture 31 Build a GUI Crackme - Simple Serial Key Input
Section 11: Disabling ASLR (Address Space Layout Randomization)
Lecture 32 Intro to disabling ASLR
Lecture 33 Using Detect It Easy (DiE) to disable ASLR
Section 12: Enabling AI Agents to access the virtual machine
Lecture 34 Intro to enabling AI agents to access the virtual machine
Lecture 35 Configuring the Split Setup lab architecture
Section 13: Using Vibe Coding to Implement MCP Tools
Lecture 36 Implementing Read Memory
Lecture 37 Using vibe coding to implement mcp tools
Lecture 38 Vibe coding the memmap tool
Lecture 39 Vibe coding the write memory and memset tools
Lecture 40 Vibe coding the disassemble tool
Lecture 41 Vibe coding the multiline disassembly tool
Lecture 42 Vibe coding the assemble tool
Lecture 43 Vibe coding the rest of the mcp tools
Section 14: Practicals on using AI in reverse engineering
Lecture 44 Finding critical function that validates serial key
Lecture 45 Creating keygen for serial key
Lecture 46 Bypassing trial period
Lecture 47 Bypassing anti-debugger protection
Lecture 48 Bypassing client-server activation system
Section 15: Optimizing MCP Tools
Lecture 49 Why Optimize
Lecture 50 Optimizing the mcp tools
Section 16: Running LLMs locally
Lecture 51 Introduction to running LLMs locally
Lecture 52 Installing LM Studio
Lecture 53 Using Streamable HTTP for MCP communication
Lecture 54 Loading models and configuring them
Lecture 55 Using a local model for reverse engineering
Section 17: .NET MCP
Lecture 56 Installing .NET MCP server (customized dnSpy)
Lecture 57 Using .NET MCP in reversing an assembly
Lecture 58 Using local LLMs in .NET reversing
Lecture 59 Using OpenAI API with 5ire for MCP reversing
Lecture 60 Allowing local LLM to access virtual machine
Section 18: Ghidra MCP
Lecture 61 Installing ghidra mcp
Lecture 62 Using ghidra mcp in reversing
Lecture 63 Accessing ghidra mcp in virtual machine
Section 19: GhidrAssist MCP
Lecture 64 Installing GhidrAssist MCP
Lecture 65 Using GhidrAssist MCP in reversing
Section 20: IDA Pro MCP Server
Lecture 66 Installing IDA Pro MCP Server
Lecture 67 Accessing IDA mcp server in virtual machine from host AI agent using mcp-proxy
Section 21: Cutter MCP Server on Linux
Lecture 68 Installing Cutter MCP Server
Lecture 69 Accessing linux cutter mcp from windows AI agent
Section 22: Resources for further studies
Lecture 70 Resources for further studies
Reverse engineers and malware analysts looking to increase productivity with AI,Ethical hackers and penetration testers exploring automation with LLMs,Cybersecurity professionals interested in practical AI integration,Developers, researchers, and learners curious about applying AI to binary analysis and debugging