
from awesome-skills-cn61
Guidance and checklists for binary reverse engineering: static/dynamic analysis, common RE tools, and practical workflows for IDA, Ghidra, radare2, angr, and Fr
Provides a compact, practitioner-focused reverse engineering skill that guides agents through common RE workflows — from initial reconnaissance to static and dynamic analysis and documentation. It outlines tool-specific environments (IDA Python, Ghidra, r2pipe), analysis phases, common code patterns, and security/ethical boundaries. The content is practical: checklists, breakpoint strategies, tracing techniques, and examples for CTF binaries and library analysis.
Use this skill when analyzing binaries, performing vulnerability research in authorized contexts, solving CTF challenges, or debugging obfuscated/native code. It is appropriate for tasks requiring file-type identification, function mapping, dynamic tracing, or documenting reverse engineering findings. Do NOT use for unauthorized or malicious activities — the skill includes clear ethics guidance.
Best used by agents that can reason about code and recommend tooling (e.g., Copilot-style assistants, Claude Code, or agents integrated with debugging/frida tooling). The skill is language/tool-agnostic and focuses on workflows rather than installing software.
Reverse engineering guidance skill with a solid methodology covering recon, static analysis, dynamic analysis, and documentation phases. Includes ethical guidelines and authorized-use framing. No bundled scripts — purely instructional. Notable formatting issue: stray closing code fence after the scripting environments list. References a resources/implementation-playbook.md that was not included. The skill is well-intentioned but mostly a checklist with no automation or tooling.
Risk marked as 'offensive' in frontmatter but content is defensive/educational. Strong ethics section. No security concerns despite the domain — properly scoped to authorized use.