Help us improve
Share bugs, ideas, or general feedback.
Share bugs, ideas, or general feedback.
Share bugs, ideas, or general feedback.
By sandbornm
Dynamically instrument and analyze live processes on Linux, iOS, and Android using Frida from Python scripts. Attach to running binaries to trace function calls, hook APIs, inspect and modify memory, enumerate modules, and perform instruction-level tracing for runtime analysis and debugging.
npx claudepluginhub sandbornm/my-claude-skills --plugin frida-instrumentSecurity analysis skills for Claude Code: static binary analysis (angr), dynamic binary instrumentation (Frida), and network capture analysis (pcap).
Install all plugins at once:
claude plugin add --from-marketplace sandbornm/my-claude-skills
Or install individual plugins:
# Static binary analysis (angr)
claude plugin add sandbornm/my-claude-skills/angr-analyzer
# Dynamic binary instrumentation (Frida)
claude plugin add sandbornm/my-claude-skills/frida-instrument
# Network capture analysis (pcap)
claude plugin add sandbornm/my-claude-skills/pcap-analyzer
Static binary analysis using angr's Python framework. Decompile executables, recover control flow graphs, find vulnerabilities via symbolic execution, and extract symbols from stripped binaries.
Prerequisites: Python 3.8+, pip install angr
Dynamic binary instrumentation using Frida. Trace function calls at runtime, hook APIs, inspect process memory, enumerate loaded modules, and perform instruction-level tracing on live processes.
Prerequisites: Python 3, pip install frida-tools
Network capture analysis for digital forensics and reverse engineering. Extract TCP/UDP streams, DNS queries, HTTP transactions, cleartext credentials, and transferred files. Detect C2 beaconing, port scanning, data exfiltration, and DNS tunneling.
Prerequisites: Python 3.8+, pip install scapy (optional: install tshark via Wireshark for enhanced features)
Share bugs, ideas, or general feedback.
Based on adoption, maintenance, documentation, and repository signals. Not a security audit or endorsement.
Analyze binaries using angr's Python framework. Decompile, recover control flow graphs, find vulnerabilities via symbolic execution, and extract symbols from stripped binaries.
Claude Code skills for x64dbg debugger automation — state snapshots, memory analysis, and more
Binary reverse engineering, malware analysis, firmware security, and software protection research for authorized security research, CTF competitions, and defensive security
Binary analysis skills for VulHunt MCP - decompilation, dataflow analysis, pattern matching, and more
Local cyber security assistant for PC issue detection, malware analysis, and system scanning
Scan Android APKs for Firebase security misconfigurations including open databases, storage buckets, authentication issues, and exposed cloud functions. For authorized security research only.
Analyze binaries using angr's Python framework. Decompile, recover control flow graphs, find vulnerabilities via symbolic execution, and extract symbols from stripped binaries.
Analyze network captures (pcap/pcapng) for forensics and reverse engineering. Extract streams, DNS, HTTP, credentials, files, and detect anomalies like beaconing or C2 traffic.
Own this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claimOwn this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claim