By p4nda0s
Reverse engineering toolkit for IDA-NO-MCP - analyze symbols and reconstruct structures from exported data
npx claudepluginhub p4nda0s/reverse-skillsEnglish | 中文
为 Claude Code 提供逆向工程分析技能的插件市场。
专为 IDA-NO-MCP 设计 - 从 IDA 导出反编译结果,然后使用 Claude Code 进行分析。
Ctrl-Shift-E)export_dir/
├── decompile/ # 反编译的 C 代码
│ ├── 0x401000.c # 每个函数一个文件,以十六进制地址命名
│ ├── 0x401234.c
│ └── ...
├── decompile_failed.txt # 反编译失败的函数列表
├── decompile_skipped.txt # 跳过的函数列表
├── strings.txt # 字符串表 (地址, 长度, 类型, 内容)
├── imports.txt # 导入表 (地址:函数名)
├── exports.txt # 导出表 (地址:函数名)
└── memory/ # 内存十六进制转储 (1MB 分块)
| 技能 | 描述 |
|---|---|
/reverse-engineering:rev-symbol | 从导出表/导入表或反编译代码分析函数符号 |
/reverse-engineering:rev-struct | 从反编译函数重建数据结构 |
# 从 GitHub 添加
/plugin marketplace add P4nda0s/reverse-skills
/plugin install reverse-engineering@reverse-engineering-skills
/reverse-engineering:rev-symbol sub_401000
/reverse-engineering:rev-struct sub_401000
MIT
Reverse engineer binaries using Ghidra's headless analyzer. Decompile executables, extract functions, strings, symbols, and analyze call graphs without GUI.
Share bugs, ideas, or general feedback.
(Unsafe) Skills, knowledge, and scripts for reverse engineering with IDA Pro. Autonomously writes and executes IDA Domain scripts to analyze binaries, extract functions, decompile code, and automate any reverse engineering task.
SQL interface to IDA Pro databases for querying and CRUD operations on functions, xrefs, strings, and decompiled code
Claude Code skills for x64dbg debugger automation — state snapshots, memory analysis, and more
Inject into any Windows x64 process and inspect memory, disassemble code, scan patterns, set breakpoints — all from Claude Code. 31 skills for reverse engineering workflows.
Binary analysis skills for VulHunt MCP - decompilation, dataflow analysis, pattern matching, and more