Help us improve
Share bugs, ideas, or general feedback.
Security analysis skills for Claude Code: angr (static binary), Frida (dynamic binary), and pcap (network capture)
npx claudepluginhub sandbornm/my-claude-skillsAnalyze binaries using angr's Python framework. Decompile, recover control flow graphs, find vulnerabilities via symbolic execution, and extract symbols from stripped binaries.
Instrument running binaries using Frida's dynamic analysis toolkit. Trace calls, hook APIs, inspect memory, enumerate modules, and perform instruction-level tracing.
Analyze network captures (pcap/pcapng) for forensics and reverse engineering. Extract streams, DNS, HTTP, credentials, files, and detect anomalies like beaconing or C2 traffic.
Claude Code marketplace entries for the plugin-safe Antigravity Awesome Skills library and its compatible editorial bundles.
Production-ready workflow orchestration with 80 focused plugins, 185 specialized agents, and 153 skills - optimized for granular installation and minimal token usage
No description available.
Share bugs, ideas, or general feedback.
Security analysis skills for Claude Code: static binary analysis (angr), dynamic binary instrumentation (Frida), and network capture analysis (pcap).
Install all plugins at once:
claude plugin add --from-marketplace sandbornm/my-claude-skills
Or install individual plugins:
# Static binary analysis (angr)
claude plugin add sandbornm/my-claude-skills/angr-analyzer
# Dynamic binary instrumentation (Frida)
claude plugin add sandbornm/my-claude-skills/frida-instrument
# Network capture analysis (pcap)
claude plugin add sandbornm/my-claude-skills/pcap-analyzer
Static binary analysis using angr's Python framework. Decompile executables, recover control flow graphs, find vulnerabilities via symbolic execution, and extract symbols from stripped binaries.
Prerequisites: Python 3.8+, pip install angr
Dynamic binary instrumentation using Frida. Trace function calls at runtime, hook APIs, inspect process memory, enumerate loaded modules, and perform instruction-level tracing on live processes.
Prerequisites: Python 3, pip install frida-tools
Network capture analysis for digital forensics and reverse engineering. Extract TCP/UDP streams, DNS queries, HTTP transactions, cleartext credentials, and transferred files. Detect C2 beaconing, port scanning, data exfiltration, and DNS tunneling.
Prerequisites: Python 3.8+, pip install scapy (optional: install tshark via Wireshark for enhanced features)