Discover and explore top open-source AI tools and projects—updated daily.
P4nda0sReverse engineering analysis for code
Top 88.9% on SourcePulse
Reverse engineering skills for Claude Code, this plugin market enhances Claude Code's capabilities for analyzing binary code. It targets reverse engineers and security researchers using Claude Code, providing automated analysis of function symbols and data structures derived from IDA Pro exports, thereby streamlining the reverse engineering workflow.
How It Works
The plugin facilitates a workflow where users first export decompiled C code, symbol tables, strings, and memory dumps from IDA Pro using the IDA-NO-MCP plugin. These exported artifacts are then processed by Claude Code, which leverages the reverse-skills plugin's commands (rev-symbol and rev-struct) to perform automated analysis of function symbols and reconstruct complex data structures from the decompiled output.
Quick Start & Requirements
/plugin marketplace add P4nda0s/reverse-skills/plugin install reverse-engineering@reverse-engineering-skillsHighlighted Details
Maintenance & Community
No specific details on contributors, community channels, or roadmap are provided in the README.
Licensing & Compatibility
Limitations & Caveats
The plugin's functionality is entirely dependent on the correct export of data from IDA Pro using the IDA-NO-MCP plugin. Analysis quality will be influenced by the effectiveness of IDA's decompilation and the IDA-NO-MCP export process. The README does not specify support for other disassemblers or decompilers.
1 month ago
Inactive