binary-re:dynamic-analysis

Official

Guided dynamic binary analysis and tracing.

Author2389-research
Version1.0.0
Installs0

System Documentation

What problem does it solve?

Analyzing binary programs manually is time-consuming and error-prone; this skill provides a framework to run binaries, observe their runtime behavior, and collect actionable data through controlled experimentation.

Core Features & Use Cases

  • Runtime execution with QEMU user-mode to map behavior across architectures.
  • Dynamic tracing with strace-like syscall logs and memory inspections for root-cause analysis.
  • Debugger integration using GDB for instruction- and breakpoint-level control.
  • Function hooking via Frida to observe or modify runtime behavior without recompilation.
  • Use cases include reverse engineering, malware analysis, security research, and debugging complex binary workloads.

Quick Start

  1. Install required tools: QEMU, GDB, and Frida.
  2. Run a binary under QEMU with tracing: qemu-arm -L <sysroot> -strace ./binary.
  3. Attach GDB for deeper debugging: gdb-multiarch ./binary or qemu-arm with -g.
  4. Hook functions on the fly with Frida: frida -f ./binary -l hook.js --no-pause.

Dependency Matrix

Required Modules

None required

Components

Standard package

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: binary-re:dynamic-analysis
Download link: https://github.com/2389-research/claude-plugins/archive/main.zip#binary-re-dynamic-analysis

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.