From drbinary-chat-plugin
Analyzes Windows PE binaries (exe, dll, sys, bin) for malware via Ghidra decompilation, string/import/export extraction, and sandbox threat assessment.
npx claudepluginhub DeepBitsTechnology/claude-plugins --plugin drbinary-chat-pluginThis skill uses the workspace's default tool permissions.
This skill enables deep analysis of suspicious binary files using remote Ghidra tools and sandbox environments. You HAVE TO upload binary files to the remote first before calling any Ghidra or sandbox tools.
Performs initial binary triage surveying memory layout, strings, imports/exports, and functions to understand behavior and flag suspicious activity like unusual sections or malicious APIs.
Reverse engineers malware binaries with Ghidra to analyze logic, crypto routines, C2 protocols, evasion at assembly/pseudo-C level. For post-triage disassembly, decompilation, binary analysis.
Performs deep static binary analysis using radare2 and Ghidra for function enumeration, disassembly, decompilation, xrefs, and control flow graphs. Use for reverse engineering binaries without execution.
Share bugs, ideas, or general feedback.
This skill enables deep analysis of suspicious binary files using remote Ghidra tools and sandbox environments. You HAVE TO upload binary files to the remote first before calling any Ghidra or sandbox tools.
Use this skill when you need to:
Use available Ghidra MCP tools to analyze the uploaded binary:
Provide a comprehensive analysis including:
Look for:
Common categories:
## Binary Analysis Report
**File Information**
- Name: [filename]
- Size: [bytes]
- MD5: [hash]
- SHA256: [hash]
**Analysis Summary**
[Brief overview of findings]
**Detailed Findings**
1. [Finding category]
- Evidence: [specific data]
- Significance: [what it means]
**Threat Assessment**
- Severity: [Critical/High/Medium/Low]
- Classification: [malware type]
- Confidence: [High/Medium/Low]
**Recommendations**
1. [Action item]
2. [Action item]
User: "I found a suspicious file called setup_installer.exe. Can you analyze it?"
Response: