From x64dbg-skills
Captures full x64dbg debuggee state snapshot—all committed memory regions as binaries + processor state as JSON—to disk for offline analysis.
npx claudepluginhub dariushoule/x64dbg-skillsThis skill is limited to using the following tools:
Capture a full debuggee state snapshot — all committed memory regions as raw binary files plus the complete processor state as JSON.
Finds OEP in packed/protected PE executables using x64dbg: traces packer stubs with anti-debug evasion, heuristic detection, captures state snapshot.
Manages IDA Pro debugger operations: CRUD breakpoints with conditions, patch/revert bytes, maintain patch inventories for binary analysis.
GDB debugging assistant for AI agents - analyze core dumps, debug live processes, investigate crashes and deadlocks with source code correlation
Share bugs, ideas, or general feedback.
Capture a full debuggee state snapshot — all committed memory regions as raw binary files plus the complete processor state as JSON.
Follow these steps exactly:
Call mcp__x64dbg__get_debugger_status to confirm the debugger is connected and a debuggee is loaded. Note the session PID and x64dbg path from the current MCP connection — you will need these to reconnect later.
If no debuggee is loaded, tell the user and stop.
If the debugger status shows the debuggee is running (not paused), call mcp__x64dbg__pause to pause it. Remember that you auto-paused so you can resume later.
Call mcp__x64dbg__disconnect to release the ZMQ connection. This is required because only one client can be connected to an x64dbg session at a time, and the Python script needs its own connection.
Execute the snapshot script:
python "${CLAUDE_PLUGIN_ROOT}\skills\state-snapshot\state_snapshot.py" --x64dbg-path "<x64dbg_path>" --pid <session_pid>
Where:
<x64dbg_path> is the path to the x64dbg executable noted in step 1<session_pid> is the debugger process PID noted in step 1The script defaults output to ./snapshots/<timestamp>/. If the user specified a custom output directory, pass --output-dir <path>.
Call mcp__x64dbg__connect_to_session with the x64dbg path and session PID saved from step 1 to restore the MCP connection.
Summarize what was captured: