state-machine-extractor
CommunityExtract state machines and dispatch tables.
Software Engineering#reverse-engineering#state-machine#diagram-generation#ida-pro#decompiled-code#dispatch-table
Authormarcosd4h
Version1.0.0
Installs0
System Documentation
What problem does it solve?
Reconstructs state machines and dispatch mappings from IDA Pro decompiled Windows binaries, turning complex control-flow into readable models and diagrams for analysis and documentation.
Core Features & Use Cases
- Detects switch/case, if-chain, and jump-table patterns in decompiled code to reveal dispatch logic.
- Reconstructs state machines with states, transitions, initial and terminal states, and visualizable representations.
- Generates Mermaid and DOT diagrams for quick visualization, reporting, and integration with documentation.
- Builds per-function dispatch tables mapping case values to handlers, with optional labeling, source tracing, and confidence scoring.
- Suitable for reverse engineering, malware analysis, and binary analysis workflows where understanding control flow is critical.
Quick Start
Run the state-machine-extractor on a module analysis database to identify dispatch tables and reconstruct state machines.
Dependency Matrix
Required Modules
None requiredComponents
scripts
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: state-machine-extractor Download link: https://github.com/marcosd4h/DeepExtractRuntime/archive/main.zip#state-machine-extractor Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.