Help us improve
Share bugs, ideas, or general feedback.
Share bugs, ideas, or general feedback.
Share bugs, ideas, or general feedback.
By sandbornm
Statically analyze binaries using angr's Python framework: decompile executables to C pseudocode, recover control flow graphs, detect vulnerabilities via symbolic execution, extract symbols from stripped binaries, and solve inputs to reach specific paths.
npx claudepluginhub sandbornm/my-claude-skills --plugin angr-analyzerSecurity analysis skills for Claude Code: static binary analysis (angr), dynamic binary instrumentation (Frida), and network capture analysis (pcap).
Install all plugins at once:
claude plugin add --from-marketplace sandbornm/my-claude-skills
Or install individual plugins:
# Static binary analysis (angr)
claude plugin add sandbornm/my-claude-skills/angr-analyzer
# Dynamic binary instrumentation (Frida)
claude plugin add sandbornm/my-claude-skills/frida-instrument
# Network capture analysis (pcap)
claude plugin add sandbornm/my-claude-skills/pcap-analyzer
Static binary analysis using angr's Python framework. Decompile executables, recover control flow graphs, find vulnerabilities via symbolic execution, and extract symbols from stripped binaries.
Prerequisites: Python 3.8+, pip install angr
Dynamic binary instrumentation using Frida. Trace function calls at runtime, hook APIs, inspect process memory, enumerate loaded modules, and perform instruction-level tracing on live processes.
Prerequisites: Python 3, pip install frida-tools
Network capture analysis for digital forensics and reverse engineering. Extract TCP/UDP streams, DNS queries, HTTP transactions, cleartext credentials, and transferred files. Detect C2 beaconing, port scanning, data exfiltration, and DNS tunneling.
Prerequisites: Python 3.8+, pip install scapy (optional: install tshark via Wireshark for enhanced features)
Share bugs, ideas, or general feedback.
Based on adoption, maintenance, documentation, and repository signals. Not a security audit or endorsement.
Analyze network captures (pcap/pcapng) for forensics and reverse engineering. Extract streams, DNS, HTTP, credentials, files, and detect anomalies like beaconing or C2 traffic.
Binary analysis skills for VulHunt MCP - decompilation, dataflow analysis, pattern matching, and more
Reverse engineer binaries using Ghidra's headless analyzer. Decompile executables, extract functions, strings, symbols, and analyze call graphs without GUI.
Claude Code skills for x64dbg debugger automation — state snapshots, memory analysis, and more
Binary reverse engineering, malware analysis, firmware security, and software protection research for authorized security research, CTF competitions, and defensive security
No description provided.
Analyze network captures (pcap/pcapng) for forensics and reverse engineering. Extract streams, DNS, HTTP, credentials, files, and detect anomalies like beaconing or C2 traffic.
Instrument running binaries using Frida's dynamic analysis toolkit. Trace calls, hook APIs, inspect memory, enumerate modules, and perform instruction-level tracing.
Own this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claimOwn this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claim