By shihwesley
Reverse engineer and extract capabilities from any source — repos, configs, binaries, articles — into your agent workflow. Security scanning, manifest tracking, cross-agent restore.
npx claudepluginhub shihwesley/shihwesley-plugins --plugin agent-reverseCheck for AgentReverse skill updates and Claude Code changelog changes on session start. Runs automatically via SessionStart hook — compares installed versions against remote, applies safe migrations, and flags breaking changes. Use when user says /agent-reverse-update to manually trigger an update check.
Reverse engineer and extract capabilities from any source — GitHub repos, local Claude Code configs, installed binaries, articles, or raw settings files. Use when user says /agent-reverse, wants to analyze a repo for extractable skills, audit their local Claude setup, install capabilities from external sources, or sync their skill manifest. Includes security scanning, manifest tracking, and cross-agent restore.
Complete collection of battle-tested Claude Code configs from an Anthropic hackathon winner - agents, skills, hooks, rules, and legacy command shims evolved over 10+ months of intensive daily use
Uses power tools
Uses Bash, Write, or Edit tools
The most comprehensive Claude Code plugin — 38 agents, 156 skills, 72 legacy command shims, selective install profiles, and production-ready hooks for TDD, security scanning, code review, and continuous learning
Core skills library for Claude Code: TDD, debugging, collaboration patterns, and proven techniques
Binary reverse engineering, malware analysis, firmware security, and software protection research for authorized security research, CTF competitions, and defensive security
Claude + Google Stitch workflow toolkit with MCP integration (prompt authoring, screen generation, design extraction)
Reliable automation, in-depth debugging, and performance analysis in Chrome using Chrome DevTools and Puppeteer