By dariushoule
Automate x64dbg debugger for reverse engineering workflows: capture and diff debuggee states, trace execution, decompile functions, unpack packed PE binaries by finding OEP, load and analyze shellcode, hunt vulnerabilities, and scan memory snapshots with YARA signatures.
npx claudepluginhub dariushoule/x64dbg-skillsDecompile a function to C-like pseudocode using angr
Smart trace-based OEP finder for packed/protected PE executables. Traces through packer stubs using intelligent stepping, anti-debug evasion, and heuristic OEP detection, then captures a state snapshot at the original entry point.
Load, unpack, and analyze shellcode in x64dbg. Use this skill when the user wants to analyze shellcode, load a shellcode blob into a debugger, unpack encoded/encrypted shellcode, or perform static/dynamic analysis of shellcode payloads.
Compare two state snapshots to identify register and memory changes between two points in time
Capture a full debuggee state snapshot (all committed memory regions + processor state) to disk for offline analysis
Trace execution (into or over calls) for N steps or until a condition, then analyze the recorded instruction log
Hunt for vulnerabilities in a running debuggee by analyzing imports/exports, triaging attack surface, and iteratively testing for bugs with PoC generation.
Scan a state snapshot's memory dumps with YARA signatures to detect packers, crypto constants, malware, and more
Inject into any Windows x64 process and inspect memory, disassemble code, scan patterns, set breakpoints — all from Claude Code. 31 skills for reverse engineering workflows.
Share bugs, ideas, or general feedback.
Binary analysis skills for VulHunt MCP - decompilation, dataflow analysis, pattern matching, and more
Reverse engineer binaries using Ghidra's headless analyzer. Decompile executables, extract functions, strings, symbols, and analyze call graphs without GUI.
Binary reverse engineering, malware analysis, firmware security, and software protection research for authorized security research, CTF competitions, and defensive security
Interact with and understand the DWARF debugging format
Local cyber security assistant for PC issue detection, malware analysis, and system scanning