reverse-engineer by sickn33/antigravity-awesome-skills
npx skills add https://github.com/sickn33/antigravity-awesome-skills --skill reverse-engineerIDAPython (IDA Pro 脚本)
Ghidra 脚本 (通过 Jython 使用 Java/Python)
r2pipe (radare2 Python API)
pwntools (CTF/漏洞利用工具包)
capstone (反汇编框架)
keystone (汇编框架)
unicorn (CPU 模拟器框架)
angr (符号执行)
Triton (动态二进制分析)
resources/implementation-playbook.md。广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
协助逆向工程任务时:
// 字符串混淆 (XOR)
for (int i = 0; i < len; i++)
str[i] ^= key;
// 反调试 (IsDebuggerPresent)
if (IsDebuggerPresent())
exit(1);
// API 哈希 (常见于恶意软件)
hash = 0;
while (*name)
hash = ror(hash, 13) + *name++;
// 栈字符串构造
char s[8];
*(DWORD*)s = 0x6C6C6548; // "Hell"
*(DWORD*)(s+4) = 0x6F; // "o\0"
用户:"我有一个 CTF 二进制文件,它要求输入密码。我该如何处理?"
响应:让我指导你进行分析:
1. 首先,识别二进制文件类型:
$ file challenge
$ checksec --file=challenge
2. 在 Ghidra/IDA 中加载并找到 main()
3. 查找:
- 字符串比较 (strcmp, memcmp)
- 加密函数 (xor 循环,常量如 0x5A827999)
- 输入验证逻辑
4. 在 GDB 中为比较函数设置断点:
$ gdb ./challenge
(gdb) break strcmp
(gdb) run
5. 在比较点检查内存以查看期望值
用户:"我需要理解这个闭源 DLL 如何处理身份验证"
响应:对于该 DLL 的授权分析:
1. 静态分析:
- 列出导出:dumpbin /exports library.dll
- 通过名称模式查找与身份验证相关的函数
- 在 IDA/Ghidra 中加载,分析导出函数
2. 动态分析:
- 使用 Frida 挂钩 API 调用
- 监控网络流量
- 跟踪函数参数
3. 文档编写:
- 记录函数签名
- 映射数据结构
- 注意任何安全考虑事项
每周安装次数
174
代码仓库
GitHub 星标数
27.1K
首次出现
2026年1月28日
安全审计
安装于
opencode160
gemini-cli153
cursor147
codex146
github-copilot143
kimi-cli134
IDAPython (IDA Pro scripting)
Ghidra scripting (Java/Python via Jython)
r2pipe (radare2 Python API)
pwntools (CTF/exploitation toolkit)
capstone (disassembly framework)
keystone (assembly framework)
unicorn (CPU emulator framework)
angr (symbolic execution)
Triton (dynamic binary analysis)
resources/implementation-playbook.md.When assisting with reverse engineering tasks:
// String obfuscation (XOR)
for (int i = 0; i < len; i++)
str[i] ^= key;
// Anti-debugging (IsDebuggerPresent)
if (IsDebuggerPresent())
exit(1);
// API hashing (common in malware)
hash = 0;
while (*name)
hash = ror(hash, 13) + *name++;
// Stack string construction
char s[8];
*(DWORD*)s = 0x6C6C6548; // "Hell"
*(DWORD*)(s+4) = 0x6F; // "o\0"
User: "I have a CTF binary that asks for a password. How do I approach this?"
Response: Let me guide you through the analysis:
1. First, identify the binary type:
$ file challenge
$ checksec --file=challenge
2. Load in Ghidra/IDA and find main()
3. Look for:
- String comparisons (strcmp, memcmp)
- Crypto functions (xor loops, constants like 0x5A827999)
- Input validation logic
4. Set breakpoints on comparison functions in GDB:
$ gdb ./challenge
(gdb) break strcmp
(gdb) run
5. Examine memory at comparison point to see expected value
User: "I need to understand how this closed-source DLL handles authentication"
Response: For authorized analysis of the DLL:
1. Static analysis:
- List exports: dumpbin /exports library.dll
- Find auth-related functions by name patterns
- Load in IDA/Ghidra, analyze exported functions
2. Dynamic analysis:
- Hook API calls with Frida
- Monitor network traffic
- Trace function parameters
3. Documentation:
- Document function signatures
- Map data structures
- Note any security considerations
Weekly Installs
174
Repository
GitHub Stars
27.1K
First Seen
Jan 28, 2026
Security Audits
Gen Agent Trust HubPassSocketPassSnykPass
Installed on
opencode160
gemini-cli153
cursor147
codex146
github-copilot143
kimi-cli134
浏览器自动化策略指南:何时及如何使用实时浏览器会话进行网页调试与研究
35,900 周安装