Fast binary analysis with string reconnaissance and static disassembly (RE Levels 1-2). Use when triaging suspicious binaries, extracting IOCs quickly, or performing initial malware analysis. Completes in ≤2 hours with automated decision gates.
Inherits all available tools
Additional assets for this skill
This skill inherits all available tools. When active, it can use any tool Claude has access to.
resources/README.mdresources/scripts/ghidra-headless.shresources/scripts/ioc-extractor.jsresources/scripts/radare2-triage.pyresources/scripts/strings-analyzer.py