Help us improve
Share bugs, ideas, or general feedback.
Share bugs, ideas, or general feedback.
Share bugs, ideas, or general feedback.
By sandbornm
Analyze pcap/pcapng network captures for digital forensics and reverse engineering by extracting TCP/UDP streams, DNS queries, HTTP traffic, credentials, and files while detecting anomalies like C2 beaconing, port scanning, and data exfiltration.
npx claudepluginhub sandbornm/my-claude-skills --plugin pcap-analyzerSecurity analysis skills for Claude Code: static binary analysis (angr), dynamic binary instrumentation (Frida), and network capture analysis (pcap).
Install all plugins at once:
claude plugin add --from-marketplace sandbornm/my-claude-skills
Or install individual plugins:
# Static binary analysis (angr)
claude plugin add sandbornm/my-claude-skills/angr-analyzer
# Dynamic binary instrumentation (Frida)
claude plugin add sandbornm/my-claude-skills/frida-instrument
# Network capture analysis (pcap)
claude plugin add sandbornm/my-claude-skills/pcap-analyzer
Static binary analysis using angr's Python framework. Decompile executables, recover control flow graphs, find vulnerabilities via symbolic execution, and extract symbols from stripped binaries.
Prerequisites: Python 3.8+, pip install angr
Dynamic binary instrumentation using Frida. Trace function calls at runtime, hook APIs, inspect process memory, enumerate loaded modules, and perform instruction-level tracing on live processes.
Prerequisites: Python 3, pip install frida-tools
Network capture analysis for digital forensics and reverse engineering. Extract TCP/UDP streams, DNS queries, HTTP transactions, cleartext credentials, and transferred files. Detect C2 beaconing, port scanning, data exfiltration, and DNS tunneling.
Prerequisites: Python 3.8+, pip install scapy (optional: install tshark via Wireshark for enhanced features)
Share bugs, ideas, or general feedback.
Based on adoption, maintenance, documentation, and repository signals. Not a security audit or endorsement.
Analyze binaries using angr's Python framework. Decompile, recover control flow graphs, find vulnerabilities via symbolic execution, and extract symbols from stripped binaries.
MalChela malware analysis toolkit — exposes file analysis, string extraction, hash lookup, NSRL queries, and directory scanning to Claude via MCP. Built for DFIR analysts and malware researchers.
Binary reverse engineering, malware analysis, firmware security, and software protection research for authorized security research, CTF competitions, and defensive security
Local cyber security assistant for PC issue detection, malware analysis, and system scanning
No description provided.
Binary analysis skills for VulHunt MCP - decompilation, dataflow analysis, pattern matching, and more
Analyze binaries using angr's Python framework. Decompile, recover control flow graphs, find vulnerabilities via symbolic execution, and extract symbols from stripped binaries.
Instrument running binaries using Frida's dynamic analysis toolkit. Trace calls, hook APIs, inspect memory, enumerate modules, and perform instruction-level tracing.
Own this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claimOwn this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claim