{"name":"sandbornm-my-claude-skills","owner":{"name":"ClaudePluginHub"},"plugins":[{"name":"sandbornm-angr-analyzer-angr-analyzer","source":{"source":"github","repo":"sandbornm/my-claude-skills"},"description":"Analyze binaries using angr's Python framework. Decompile, recover control flow graphs, find vulnerabilities via symbolic execution, and extract symbols from stripped binaries.","version":"1.0.0","strict":true,"keywords":[],"category":"utilities"},{"name":"sandbornm-frida-instrument-frida-instrument","source":{"source":"github","repo":"sandbornm/my-claude-skills"},"description":"Instrument running binaries using Frida's dynamic analysis toolkit. Trace calls, hook APIs, inspect memory, enumerate modules, and perform instruction-level tracing.","version":"1.0.0","strict":true,"keywords":[],"category":"deployment"},{"name":"sandbornm-pcap-analyzer-pcap-analyzer","source":{"source":"github","repo":"sandbornm/my-claude-skills"},"description":"Analyze network captures (pcap/pcapng) for forensics and reverse engineering. Extract streams, DNS, HTTP, credentials, files, and detect anomalies like beaconing or C2 traffic.","version":"1.0.0","strict":true,"keywords":[],"category":"utilities"}]}