
from opencode-skills-collection10
Guided methodology and best practices for binary reverse engineering, covering static and dynamic analysis workflows and common tooling.
This skill provides a compact, practical methodology for binary reverse engineering tasks. It outlines reconnaissance, static and dynamic analysis phases, tooling recommendations (IDA/Ghidra, radare2, capstone, unicorn, angr), and documentation practices to produce reproducible findings. The skill is focused on authorized analysis: CTFs, security research, and defensive investigations.
Use this skill when you need a step-by-step approach to analyze binaries: identifying file type and architecture, mapping program structure, instrumenting execution, or producing technical documentation of results. It's suited for CTF challenges, library analysis, malware triage (defensive only), and developer interoperability investigations.
Suitable for agents that can reason about code and shell workflows (Copilot-style/code assistants, Claude Code, Codex). For dynamic analysis steps, human oversight is required to run tooling and handle isolated environments.
Reverse engineering guidance skill with a solid methodology covering recon, static analysis, dynamic analysis, and documentation phases. Includes ethical guidelines and authorized-use framing. No bundled scripts — purely instructional. Notable formatting issue: stray closing code fence after the scripting environments list. References a resources/implementation-playbook.md that was not included. The skill is well-intentioned but mostly a checklist with no automation or tooling.
Risk marked as 'offensive' in frontmatter but content is defensive/educational. Strong ethics section. No security concerns despite the domain — properly scoped to authorized use.