state-machine-extractor

Community

Extract state machines and dispatch tables.

Authormarcosd4h
Version1.0.0
Installs0

System Documentation

What problem does it solve?

Reconstructs state machines and dispatch mappings from IDA Pro decompiled Windows binaries, turning complex control-flow into readable models and diagrams for analysis and documentation.

Core Features & Use Cases

  • Detects switch/case, if-chain, and jump-table patterns in decompiled code to reveal dispatch logic.
  • Reconstructs state machines with states, transitions, initial and terminal states, and visualizable representations.
  • Generates Mermaid and DOT diagrams for quick visualization, reporting, and integration with documentation.
  • Builds per-function dispatch tables mapping case values to handlers, with optional labeling, source tracing, and confidence scoring.
  • Suitable for reverse engineering, malware analysis, and binary analysis workflows where understanding control flow is critical.

Quick Start

Run the state-machine-extractor on a module analysis database to identify dispatch tables and reconstruct state machines.

Dependency Matrix

Required Modules

None required

Components

scripts

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: state-machine-extractor
Download link: https://github.com/marcosd4h/DeepExtractRuntime/archive/main.zip#state-machine-extractor

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.