Help us improve
Share bugs, ideas, or general feedback.
AlgoKiller suite — ARM64 trace evidence analysis & cipher algorithm recovery. Claude plugin (loadable from both Claude Code and Claude Desktop) packaging the AlgoKiller methodology as skills + a local MCP server driving the native ak_search engine (15 subcommands) over GB-scale trace files.
npx claudepluginhub icloudza/algokiller-pluginAlgoKiller — ARM64 trace evidence analysis & cipher algorithm recovery. Bundles the AlgoKiller methodology as skills + a local MCP server (28 tools) that drives the native ak_search engine over GB-scale trace files. v1.2.0 adds two trace tools targeted at OLLVM-flattened binaries — `trace_function` (PC-level invocation analyzer with depth-counter ret boundary, replaces manual trace_search + trace_context loop for stripped helpers) and `trace_immseq` (anchor-driven prev_reg sequence extraction, recovers table-consumption order from jump-table-dispatcher functions). Formalizes R9 (`regN=X -> regN=Y` prev/new semantics — single most common LLM misread in obfuscated code) and FIX #8 (algorithm-name claims require trace_cryptoinstr/trace_constscan/trace_immseq/trace_function fingerprint corroboration before conclude(>=medium)). Loosens five over-strict gates: trace_search limit 100→500, B2 same-args rule exempts hint-driven fallback paths, cross-session [H<n>] references become non-blocking warnings instead of hard errors. Tests 128 → 149 PASS.
Claude Code marketplace entries for the plugin-safe Antigravity Awesome Skills library and its compatible editorial bundles.
Production-ready workflow orchestration with 80 focused plugins, 185 specialized agents, and 153 skills - optimized for granular installation and minimal token usage
Directory of popular Claude Code extensions including development tools, productivity plugins, and MCP integrations
Share bugs, ideas, or general feedback.