ghidra
CommunityReverse engineer binaries with NSA's Ghidra.
Software Engineering#reverse engineering#binary analysis#ghidra#decompiler#malware analysis#disassembler
AuthorAeonDave
Version1.0.0
Installs0
System Documentation
What problem does it solve?
This Skill provides a powerful suite for static analysis of binaries, enabling users to understand complex code, identify vulnerabilities, and recover algorithms without executing the program.
Core Features & Use Cases
- Disassembly and Decompilation: View assembly code and C pseudocode for deep code understanding.
- Scripting: Automate analysis tasks with Python or Java scripts.
- Use Case: Analyze a suspicious executable to understand its functionality, identify potential backdoors, or find exploitable weaknesses.
Quick Start
Use Ghidra to analyze the attached binary file 'sample.exe' and list the first 10 function names.
Dependency Matrix
Required Modules
None requiredComponents
references
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: ghidra Download link: https://github.com/AeonDave/malskill/archive/main.zip#ghidra Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.