Analyze binary files (exe, dll, sys, bin, ocx, scr, cpl, drv) to assess if they are malicious, perform decompilation, extract strings/imports/exports, detect malware, and provide threat assessment. Use this skill when user asks to analyze, examine, check, or assess any binary file, asks if a file is malicious/suspicious/safe, or provides a file path to a binary. Trigger for phrases like "Is [file] malicious?", "Analyze [file]", "What does [binary] do?", or any request involving binary file analysis.
Analyze binary files for malware using decompilation and static analysis. Triggered when users ask to analyze, check if suspicious, or assess any executable file.
/plugin marketplace add DeepBitsTechnology/claude-plugins/plugin install drbinary-chat-plugin@deepbitsThis skill inherits all available tools. When active, it can use any tool Claude has access to.
This skill enables deep analysis of suspicious binary files using remote Ghidra tools and sandbox environments. You HAVE TO upload binary files to the remote first before calling any Ghidra or sandbox tools.
Use this skill when you need to:
Use available Ghidra MCP tools to analyze the uploaded binary:
Provide a comprehensive analysis including:
Look for:
Common categories:
## Binary Analysis Report
**File Information**
- Name: [filename]
- Size: [bytes]
- MD5: [hash]
- SHA256: [hash]
**Analysis Summary**
[Brief overview of findings]
**Detailed Findings**
1. [Finding category]
- Evidence: [specific data]
- Significance: [what it means]
**Threat Assessment**
- Severity: [Critical/High/Medium/Low]
- Classification: [malware type]
- Confidence: [High/Medium/Low]
**Recommendations**
1. [Action item]
2. [Action item]
User: "I found a suspicious file called setup_installer.exe. Can you analyze it?"
Response: