Back to tags
Tag

Agent Skills with tag: reverse-engineering

14 skills match this tag. Use tags to discover related Agent Skills and explore similar workflows.

reverse-engineering

ソフトウェアのリバースエンジニアリングレポートを作成するスキル。リポジトリの構造や機能を調査し、外部仕様・内部実装・使用方法を明確にするレポートを作成します。「リバースエンジニアリングレポートを作成して」「コードベースを分析して」「プロジェクトの構造を調査して」「システムの仕組みを解析して」等のリクエストで使用してください。新規開発者のオンボーディング、プロジェクトの理解、ドキュメント作成、将来の開発のための基礎資料として活用できます。

reverse-engineeringcodebase-analysisdocumentationsystem-analysis
ks6088ts-labs
ks6088ts-labs
0

create-specs

Transform reverse-engineering documentation into GitHub Spec Kit format. Initializes .specify/ directory, creates constitution.md, generates specifications from reverse-engineered docs, and sets up for /speckit slash commands. This is Step 3 of 6 in the reverse engineering process.

reverse-engineeringdocumentationspec-kitworkflow-automation
jschulte
jschulte
2

gap-analysis

Route-aware gap analysis. For Brownfield - uses /speckit.analyze to compare specs against implementation. For Greenfield - validates spec completeness and asks about target tech stack for new implementation. This is Step 4 of 6 in the reverse engineering process.

gap-analysisspec-validationreverse-engineeringbrownfield
jschulte
jschulte
2

implement

Use GitHub Spec Kit's /speckit.implement and /speckit.tasks to systematically build missing features from specifications. Leverages implementation plans in specs/, validates against acceptance criteria, and achieves 100% spec completion. This is Step 6 of 6 in the reverse engineering process.

specification-documentsacceptance-criteriaimplementation-planfeature-implementation
jschulte
jschulte
2

reverse-engineer

Deep codebase analysis to generate 9 comprehensive documentation files. Adapts based on path choice - Greenfield extracts business logic only (tech-agnostic), Brownfield extracts business logic + technical implementation (tech-prescriptive). This is Step 2 of 6 in the reverse engineering process.

reverse-engineeringcodebase-analysiscode-documentationbusiness-logic-extraction
jschulte
jschulte
2

analyze

Perform initial analysis of a codebase - detect tech stack, directory structure, and completeness. This is Step 1 of the 6-step reverse engineering process that transforms incomplete applications into spec-driven codebases. Automatically detects programming languages, frameworks, architecture patterns, and generates comprehensive analysis-report.md. Use when starting reverse engineering on any codebase.

tech-stackcodebase-analysisarchitecture-patternsframework-detection
jschulte
jschulte
2

spec-miner

Use when understanding legacy or undocumented systems, creating documentation for existing code, or extracting specifications from implementations. Invoke for legacy analysis, code archaeology, undocumented features. Keywords: reverse engineering, code analysis, legacy, documentation, specification.

reverse-engineeringspecification-documentstechnical-writinglegacy-code
Jeffallan
Jeffallan
245

ipsw

Apple firmware and binary reverse engineering with the ipsw CLI tool. Use when analyzing iOS/macOS binaries, disassembling functions in dyld_shared_cache, dumping Objective-C headers from private frameworks, downloading IPSWs or kernelcaches, extracting entitlements, analyzing Mach-O files, or researching Apple security. Triggers on requests involving Apple RE, iOS internals, kernel analysis, KEXT extraction, or vulnerability research on Apple platforms.

reverse-engineeringstatic-analysisterminalios
blacktop
blacktop
311

ctf-solver

Solve CTF (Capture The Flag) challenges by analyzing challenge descriptions, source code, and interacting with challenge environments to capture flags.

ethical-hackingexploit-developmentpenetration-testingreconnaissance
hacktron
hacktron
739

patch-diff-analyzer

Specialized in reverse-engineering compiled binaries (JARs, DLLs). Use this when the user asks to compare versions, find security fixes, or analyze binary patches.

static-analysisreverse-engineeringbinary-analysispatch-diff
hacktron
hacktron
739

ghidra

Reverse engineer binaries using Ghidra's headless analyzer. Decompile executables, extract functions, strings, symbols, and analyze call graphs without GUI.

static-analysisdecompilationreverse-engineeringcall-graph-analysis
mitsuhiko
mitsuhiko
57234

apktool

Android APK unpacking and resource extraction tool for reverse engineering. Use when you need to decode APK files, extract resources, examine AndroidManifest.xml, analyze smali code, or repackage modified APKs.

reverse-engineeringstatic-analysisterminalandroid
BrownFineSecurity
BrownFineSecurity
47984

jadx

Android APK decompiler that converts DEX bytecode to readable Java source code. Use when you need to decompile APK files, analyze app logic, search for vulnerabilities, find hardcoded credentials, or understand app behavior through readable source code.

static-analysisvulnerability-assessmentreverse-engineeringandroid
BrownFineSecurity
BrownFineSecurity
47984

ghidra

Reverse engineer binaries using Ghidra's headless analyzer. Decompile executables, extract functions, strings, symbols, and analyze call graphs without GUI.

static-analysiscommand-linereverse-engineeringghidra
mitsuhiko
mitsuhiko
57234