ghidra

Community

Reverse engineer binaries with NSA's Ghidra.

AuthorAeonDave
Version1.0.0
Installs0

System Documentation

What problem does it solve?

This Skill provides a powerful suite for static analysis of binaries, enabling users to understand complex code, identify vulnerabilities, and recover algorithms without executing the program.

Core Features & Use Cases

  • Disassembly and Decompilation: View assembly code and C pseudocode for deep code understanding.
  • Scripting: Automate analysis tasks with Python or Java scripts.
  • Use Case: Analyze a suspicious executable to understand its functionality, identify potential backdoors, or find exploitable weaknesses.

Quick Start

Use Ghidra to analyze the attached binary file 'sample.exe' and list the first 10 function names.

Dependency Matrix

Required Modules

None required

Components

references

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: ghidra
Download link: https://github.com/AeonDave/malskill/archive/main.zip#ghidra

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.