From arc-probe
Analyzes loaded modules in target processes: exports via PE headers, RTTI C++ classes, strings, key functions, and cross-references. For reverse engineering DLLs.
npx claudepluginhub vzco/arc-probe --plugin arc-probeThis skill uses the workspace's default tool permissions.
Deep analysis of a loaded module in the target process.
Analyzes loaded modules to discover functions from exports, RTTI, and .pdata; scans strings, traces references to key functions, and builds labeled GUI function maps. For reverse engineering DLLs/EXEs like client.dll.
Performs initial binary triage surveying memory layout, strings, imports/exports, and functions to understand behavior and flag suspicious activity like unusual sections or malicious APIs.
Triages and audits IDA binaries to detect suspicious behavior, crypto/network activity, review decompiled code against source, and run multi-table queries.
Share bugs, ideas, or general feedback.
Deep analysis of a loaded module in the target process.
module (required): Module name (e.g., "target.dll", "engine.dll")Get module info -- Call probe_modules to list all loaded modules. Find the target module and note its base address and size. If the module is not found, report available modules and stop.
Module overview -- Report:
Export table -- Call probe_pattern_scan with the module name to locate the PE export directory. Alternatively, use probe_dump at the module base to read the PE headers:
RTTI scan -- Scan for RTTI type descriptors to identify C++ classes:
.?AV (RTTI type info string prefix) within the moduleString references -- Scan for interesting strings:
probe_find_value for specific strings if looking for something particularKey function identification -- For each interesting string or export:
Report -- Present a structured analysis:
Module: target.dll
Base: 0x7FF612340000
Size: 0x1A0000
Exports: (list)
Classes (RTTI): (list with vtable addresses)
Key Functions: (list with addresses and descriptions)
Notable Strings: (list with addresses)