By allthingsida
Query and manipulate IDA Pro databases (.idb/.i64) using SQL for reverse engineering workflows: analyze disassembly, decompiled pseudocode, cross-references, strings, functions, and binary data; perform CRUD like annotations, symbol renaming, type application, breakpoint management, and byte patching.
npx claudepluginhub allthingsida/idasql-skills --plugin idasqlTriage and audit IDA binaries. Use when asked to analyze a binary, find suspicious behavior, detect crypto/network activity, review decompiled code against source, or run multi-table queries.
Edit IDA databases. Use when asked to add comments, rename symbols, apply types, create bookmarks, or clean up decompiled code for review.
Connect to IDA databases and bootstrap sessions. Use when starting analysis, routing to other skills, or setting up CLI/HTTP/MCP connections.
Query IDA strings, bytes, and binary data. Use when asked to search strings, find byte patterns, rebuild string tables, or analyze binary content.
IDA debugger operations. Use when asked to set breakpoints, patch bytes, add conditions, or manage a patch inventory.
Decompile and analyze IDA functions. Use when asked for pseudocode, ctree AST analysis, local variables, labels, or decompiler-driven cleanup.
Query IDA disassembly. Use when asked about functions, segments, instructions, blocks, operands, control flow, or raw code structure.
Complete idasql SQL function reference catalog. Use when looking up function signatures, parameters, or usage examples.
Search named IDA entities by pattern. Use when asked to find functions, labels, types, or members by name, or to seed xref/decompiler workflows from a name lookup.
Execute IDAPython via idasql. Use when SQL surfaces are insufficient and direct IDA SDK access is needed via Python snippets or scripts.
Re-source IDA binaries. Use when asked for recursive annotation, structure recovery, type reconstruction, or bottom-up program understanding.
Persistent key-value storage in IDA databases. Use when asked to store metadata, track progress, or persist session state via netnode_kv.
IDA type system. Use when asked to create, modify, or apply structs, unions, enums, typedefs, or parse C declarations.
Capture live IDA UI context. Use when the user references what's on screen, what's selected, or asks about the current view in IDA's GUI.
Analyze IDA cross-references. Use when asked about callers, callees, imports, data refs, call graphs, or dependency chains.
Claude Code skills for idasql — a live SQL interface to IDA Pro databases, with optional Codex app metadata layered on top.
idasql -h/plugin marketplace add allthingsida/idasql-skills
SKILL.md is the canonical skill contract and remains the source of truth.agents/openai.yaml and does not replace SKILL.md.| Skill | Description | When to Use |
|---|---|---|
connect | Connection, CLI, HTTP, UI context, routing index | Starting a session, CLI options, HTTP server, pragmas |
disassembly | Functions, segments, instructions, blocks | Querying disassembly, instruction analysis, file generation |
data | Strings, bytes, string cross-references | String search, byte access, binary pattern search |
grep | Named entity search | Find functions, labels, types, and members by pattern |
xrefs | Cross-references and imports | Caller/callee analysis, import queries, reference graphs |
decompiler | Full decompiler reference | Decompilation, ctree AST, local variables, union selection |
annotations | Edit and annotate decompilation | Comments, renames, type application, enum/struct editing |
types | Type system mechanics | Structs, unions, enums, parse_decls, type classification |
debugger | Breakpoints and byte patching | Breakpoint CRUD, byte patching, patch inventory |
storage | Persistent key-value storage (netnode) | Store/retrieve data inside the IDB |
idapython | Python execution via SQL | Execute IDAPython snippets and files |
functions | SQL functions reference | Look up any idasql SQL function signature |
analysis | Analysis workflows and scenarios | Security audits, library detection, advanced SQL patterns |
re-source | Recursive source recovery methodology | Decompilation cleanup, structure recovery, annotation workflows |
Elias Bachaalany (@0xeb)
This project and all its contents — including skill definitions, reference documentation, and configuration files — are licensed under the Mozilla Public License 2.0.
Reverse engineering toolkit for IDA-NO-MCP - analyze symbols and reconstruct structures from exported data
Share bugs, ideas, or general feedback.
(Unsafe) Skills, knowledge, and scripts for reverse engineering with IDA Pro. Autonomously writes and executes IDA Domain scripts to analyze binaries, extract functions, decompile code, and automate any reverse engineering task.
Rust development skills for contributing to IDALIB Rust bindings
Reverse engineer binaries using Ghidra's headless analyzer. Decompile executables, extract functions, strings, symbols, and analyze call graphs without GUI.
Claude Code skills for x64dbg debugger automation — state snapshots, memory analysis, and more
Inject into any Windows x64 process and inspect memory, disassemble code, scan patterns, set breakpoints — all from Claude Code. 31 skills for reverse engineering workflows.