specialized-file-analyzer
CommunityAnalyze non-PE files with format-specific tools
Education & Research#javascript#powershell#malware-analysis#pdf-analysis#non-pe-files#office-macros#elf-binaries
Authorgl0bal01
Version1.0.0
Installs0
System Documentation
What problem does it solve?
Analyze specialized file types beyond standard PE executables to identify threats, extract payloads, and surface actionable indicators.
Core Features & Use Cases
- Format-specific analysis workflows for .NET assemblies, Office macros, PDFs, PowerShell/JavaScript, archives, and ELF binaries.
- Macro and payload discovery including deobfuscation, embedded resources, and IOCs.
- Use Case: When encountering a suspicious document or non-Windows executable, employ this skill to produce format-specific findings and IOCs for incident response.
Quick Start
Open a suspicious file (e.g., sample.docm or sample.bin) and begin a format-specific analysis using the recommended workflow.
Dependency Matrix
Required Modules
None requiredComponents
Standard package💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: specialized-file-analyzer Download link: https://github.com/gl0bal01/malware-analysis-claude-skills/archive/main.zip#specialized-file-analyzer Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.