Extended deep-dive reverse engineering with advanced tracing, deobfuscation, and exploit validation.
/plugin marketplace add DNYoussef/context-cascade/plugin install dnyoussef-context-cascade@DNYoussef/context-cascadeThis skill inherits all available tools. When active, it can use any tool Claude has access to.
README.mdSKILL-meta.yamlresources/README.mdresources/scripts/angr-symbolic-exec.pyresources/scripts/gdb-automation.pyBefore writing ANY code, you MUST check:
.claude/library/catalog.json.claude/docs/inventories/LIBRARY-PATTERNS-GUIDE.mdD:\Projects\*| Match | Action |
|---|---|
| Library >90% | REUSE directly |
| Library 70-90% | ADAPT minimally |
| Pattern exists | FOLLOW pattern |
| In project | EXTRACT |
| No match | BUILD (add to library after) |
Perform extended, high-effort reverse engineering that blends static/dynamic/symbolic analysis and deobfuscation to reach hard paths and validate exploitability. Built on skill-forge structure-first rules and prompt-architect explicit constraints/confidence ceilings.
reverse-engineering-firmware), quick IOC triage (reverse-engineering-quick), or lighter triage (reverse-engineer-debug).skills/security/reverse-engineering-extended/reverse-engineering-deep-analysis/{project}/{timestamp} with MCP tags (WHO=reverse-engineering-deep-analysis-{session}, WHY=skill-execution).Confidence: X.XX (ceiling: TYPE Y.YY) - reason.Confidence: 0.72 (ceiling: inference 0.70) - Extended deep analysis aligned with skill-forge and prompt-architect standards.
This skill should be used when the user asks to "create a hookify rule", "write a hook rule", "configure hookify", "add a hookify rule", or needs guidance on hookify rule syntax and patterns.
Create distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.