specialized-file-analyzer

Community

Analyze non-PE files with format-specific tools

Authorgl0bal01
Version1.0.0
Installs0

System Documentation

What problem does it solve?

Analyze specialized file types beyond standard PE executables to identify threats, extract payloads, and surface actionable indicators.

Core Features & Use Cases

  • Format-specific analysis workflows for .NET assemblies, Office macros, PDFs, PowerShell/JavaScript, archives, and ELF binaries.
  • Macro and payload discovery including deobfuscation, embedded resources, and IOCs.
  • Use Case: When encountering a suspicious document or non-Windows executable, employ this skill to produce format-specific findings and IOCs for incident response.

Quick Start

Open a suspicious file (e.g., sample.docm or sample.bin) and begin a format-specific analysis using the recommended workflow.

Dependency Matrix

Required Modules

None required

Components

Standard package

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: specialized-file-analyzer
Download link: https://github.com/gl0bal01/malware-analysis-claude-skills/archive/main.zip#specialized-file-analyzer

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.