binary-re — community binary-re, marketplace, community, ide skills

v1.0.0

About this Skill

Perfect for Reverse Engineering Agents needing comprehensive binary analysis and security auditing capabilities. This skill should be used when analyzing binaries, executables, or bytecode to understand what they do or how they work. Triggers on binary, executable, ELF, what does this do, reverse engineer, disas

aiskillstore aiskillstore
[0]
[0]
Updated: 2/20/2026

Killer-Skills Review

Decision support comes first. Repository text comes second.

Reviewed Landing Page Review Score: 9/11

Killer-Skills keeps this page indexable because it adds recommendation, limitations, and review signals beyond the upstream repository text.

Original recommendation layer Concrete use-case guidance Explicit limitations and caution Quality floor passed for review Locale and body language aligned
Review Score
9/11
Quality Score
50
Canonical Locale
en
Detected Body Locale
en

Perfect for Reverse Engineering Agents needing comprehensive binary analysis and security auditing capabilities. This skill should be used when analyzing binaries, executables, or bytecode to understand what they do or how they work. Triggers on binary, executable, ELF, what does this do, reverse engineer, disas

Core Value

Empowers agents to perform fast fingerprinting, static analysis using r2 and Ghidra, and disassemble binaries, providing a superpower for identifying file types, functions, and vulnerabilities in executables.

Ideal Agent Persona

Perfect for Reverse Engineering Agents needing comprehensive binary analysis and security auditing capabilities.

Capabilities Granted for binary-re

Automating binary triage for rapid identification and classification
Generating detailed reports through static analysis of binaries
Debugging and reverse engineering proprietary software for security auditing

! Prerequisites & Limits

  • Requires security auditing expertise for effective usage
  • Limited to binary reverse engineering, not applicable to other file types
  • Dependent on r2 and Ghidra for static analysis

Source Boundary

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

Curated Collection Review

Reviewed In Curated Collections

This section shows how Killer-Skills has already collected, reviewed, and maintained this skill inside first-party curated paths. For operators and crawlers alike, this is a stronger signal than treating the upstream README as the primary story.

After The Review

Decide The Next Action Before You Keep Reading Repository Material

Killer-Skills should not stop at opening repository instructions. It should help you decide whether to install this skill, when to cross-check against trusted collections, and when to move into workflow rollout.

Labs Demo

Browser Sandbox Environment

⚡️ Ready to unleash?

Experience this Agent in a zero-setup browser environment powered by WebContainers. No installation required.

Boot Container Sandbox

FAQ & Installation Steps

These questions and steps mirror the structured data on this page for better search understanding.

? Frequently Asked Questions

What is binary-re?

Perfect for Reverse Engineering Agents needing comprehensive binary analysis and security auditing capabilities. This skill should be used when analyzing binaries, executables, or bytecode to understand what they do or how they work. Triggers on binary, executable, ELF, what does this do, reverse engineer, disas

How do I install binary-re?

Run the command: npx killer-skills add aiskillstore/marketplace/binary-re. It works with Cursor, Windsurf, VS Code, Claude Code, and 19+ other IDEs.

What are the use cases for binary-re?

Key use cases include: Automating binary triage for rapid identification and classification, Generating detailed reports through static analysis of binaries, Debugging and reverse engineering proprietary software for security auditing.

Which IDEs are compatible with binary-re?

This skill is compatible with Cursor, Windsurf, VS Code, Trae, Claude Code, OpenClaw, Aider, Codex, OpenCode, Goose, Cline, Roo Code, Kiro, Augment Code, Continue, GitHub Copilot, Sourcegraph Cody, and Amazon Q Developer. Use the Killer-Skills CLI for universal one-command installation.

Are there any limitations for binary-re?

Requires security auditing expertise for effective usage. Limited to binary reverse engineering, not applicable to other file types. Dependent on r2 and Ghidra for static analysis.

How To Install

  1. 1. Open your terminal

    Open the terminal or command line in your project directory.

  2. 2. Run the install command

    Run: npx killer-skills add aiskillstore/marketplace/binary-re. The CLI will automatically detect your IDE or AI agent and configure the skill.

  3. 3. Start using the skill

    The skill is now active. Your AI agent can use binary-re immediately in the current project.

Upstream Repository Material

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

Upstream Source

binary-re

Install binary-re, an AI agent skill for AI agent workflows and automation. Review the use cases, limitations, and setup path before rollout.

SKILL.md
Readonly
Upstream Repository Material
The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.
Supporting Evidence

Binary Reverse Engineering

Purpose

Comprehensive guide for binary reverse engineering. This skill provides the overall methodology, philosophy, and reference material. Related skills handle specific phases:

SkillPurposeTrigger Keywords
binary-re:triageFast fingerprinting"what is this binary", "identify", "file type"
binary-re:static-analysisr2 + Ghidra analysis"disassemble", "decompile", "functions"
binary-re:dynamic-analysisQEMU + GDB + Frida"run", "execute", "debug", "trace"
binary-re:synthesisReport generation"summarize", "report", "document findings"
binary-re:tool-setupInstall tools"install", "setup", "tool not found"

Note: Each skill auto-detects based on keywords. You don't need to explicitly route - just ask what you need.

Pre-Flight Verification

Before beginning any analysis, verify tooling availability:

Core Tools (Required)

bash
1rabin2 -v # Should show version 2r2 -v # Should show version

Decompilation (Optional)

bash
1# Check r2ghidra availability 2r2 -qc 'pdg?' - 2>/dev/null | grep -q Usage && echo "r2ghidra OK" || echo "r2ghidra missing - install with: r2pm -ci r2ghidra"

Dynamic Analysis Platform Check

Host PlatformMethodSetup Required
Linux x86_64Native QEMUapt install qemu-user
macOS (any)Docker + binfmtSee binary-re-tool-setup skill
WindowsWSL2Use Linux method inside WSL

If dynamic tools unavailable: Proceed with static-only analysis, note reduced confidence in synthesis phase.

Fallback Tooling (No r2/Ghidra)

When radare2 or Ghidra aren't available, use standard binutils/LLVM tools:

bash
1# Metadata (replaces rabin2 -I) 2readelf -h binary # ELF header 3readelf -d binary # Dynamic section (dependencies) 4file binary # Quick identification 5 6# Imports/Exports (replaces rabin2 -i/-E) 7readelf -Ws binary | grep -E "FUNC|OBJECT" | awk '{print $8}' 8nm -D binary 2>/dev/null # Dynamic symbols 9 10# Strings (replaces rabin2 -zz) 11strings -a -n 8 binary | grep -Ei 'http|ftp|/etc|/var|error|pass|key|token|api' 12 13# Disassembly (replaces r2 pdf) 14objdump -d -M intel binary | head -500 15# Or LLVM (better cross-arch support): 16llvm-objdump -d --no-show-raw-insn binary | head -500 17 18# Dependencies (replaces rabin2 -l) 19ldd binary 2>/dev/null || readelf -d binary | grep NEEDED

Limitations of fallback approach:

  • No cross-references (axt/axf) - must trace manually
  • No decompilation - assembly only
  • No function boundary detection - raw disassembly
  • Reduced accuracy for stripped binaries

Philosophy

The LLM drives analysis; the human provides context.

Human provides:

  • Platform info (device type, OS, hardware)
  • Suspected purpose (what the binary might do)
  • Constraints (no network, isolated env, etc.)

LLM executes:

  • Tool selection and invocation
  • Hypothesis formation from evidence
  • Experiment design
  • Knowledge synthesis

The Agentic Loop

┌─────────────────────────────────────────────────┐
│           HYPOTHESIS-DRIVEN ANALYSIS            │
├─────────────────────────────────────────────────┤
│                                                 │
│  0. I/O SANITY → Compare known inputs/outputs   │
│  1. OBSERVE → Gather facts via tools            │
│  2. HYPOTHESIZE → Form theories from facts      │
│  3. PLAN → Design experiments to test theories  │
│  4. EXECUTE → Run tools (gate risky ops)        │
│  5. RECORD → Capture observations               │
│  6. UPDATE → Confirm/refute hypotheses          │
│  7. LOOP → Until understanding sufficient       │
│                                                 │
└─────────────────────────────────────────────────┘

Step 0: Compare Known I/O First (CRITICAL)

Before diving into code analysis, always check if known inputs/outputs exist.

This step prevents hours of wasted analysis by establishing ground truth first.

⚠️ REQUIRES HUMAN APPROVAL - Even for I/O comparison, get explicit approval before execution.

bash
1# SAFE: Use emulation for cross-arch binaries (after human approval) 2# ARM32 example: 3qemu-arm -L /usr/arm-linux-gnueabihf -- ./binary input.txt > actual_output.txt 4 5# x86-64 native (still requires approval): 6./binary input.txt > actual_output.txt 7 8# Docker-based (macOS - safest option): 9docker run --rm --platform linux/arm/v7 -v ~/samples:/work:ro \ 10 arm32v7/debian:bullseye-slim /work/binary /work/input.txt > actual_output.txt 11 12# Compare outputs: 13diff expected_output.txt actual_output.txt 14cmp -l expected_output.txt actual_output.txt | head -20 # Byte-level 15 16# Document the delta: 17# - Where does output first diverge? 18# - What pattern appears in the corruption? 19# - Does file size match (logic bug) or differ (truncation)?

Record as FACT:

FACT: Output differs at byte {N}, expected "{X}" got "{Y}" (source: diff/cmp)
FACT: File sizes match/differ by {N} bytes (source: ls -l)

This single step often reveals the bug category before any disassembly.

Knowledge Model

Throughout analysis, maintain structured knowledge via episodic memory:

FACTS: Verified observations with tool attribution
HYPOTHESES: Theories with confidence and evidence
QUESTIONS: Open unknowns blocking progress
EXPERIMENTS: Planned tool invocations
OBSERVATIONS: Results from experiments
DECISIONS: Human-approved choices with rationale

Episodic Memory Integration

Knowledge persists across sessions via episodic memory. Use consistent tagging:

[BINARY-RE:{phase}] {artifact_name} (sha256: {hash})
FACT: {observation} (source: {tool})
HYPOTHESIS: {theory} (confidence: {0.0-1.0})
QUESTION: {unknown}
DECISION: {choice} (rationale: {why})

Starting analysis: Search episodic memory for artifact hash first After each phase: Findings are automatically captured in conversation Resuming: Search [BINARY-RE] {artifact_name} to restore context

Human-in-the-Loop Triggers

ALWAYS ask human before:

  1. Executing the binary - Even under QEMU, confirm sandbox
  2. Network operations - Prevent unintended phone-home
  3. Conflicting evidence - Resolve contradictory findings
  4. Privileged operations - Device access, root actions
  5. Major direction changes - Significant analysis pivots

Session Management

Starting New Analysis

1. Compute artifact hash: sha256sum binary
2. Search episodic memory: "[BINARY-RE] sha256:{hash}"
3. If previous analysis found:
   → "Found previous analysis from {date}. Resume or start fresh?"
4. If resuming: Load facts/hypotheses, continue from last phase
5. If fresh: Begin with triage phase

Resuming Interrupted Analysis

User: "Continue analyzing that thermostat binary"

Claude:
1. Invoke episodic-memory:search-conversations
   Query: "[BINARY-RE] thermostat"
2. Retrieve previous session findings
3. Summarize: "Last session identified ARM32/musl, found network
   functions. We were about to run dynamic analysis."
4. Continue from that phase

Searching Past Analyses

User: "Have we analyzed any ARM binaries with hardcoded passwords?"

Claude:
1. Search: "[BINARY-RE] FACT: hardcoded" or "[BINARY-RE] ARM"
2. Return matching artifacts and findings

Standard Analysis Flow

For typical unknown binary analysis:

1. Triage (binary-re-triage)
   └─ Architecture, ABI, dependencies, capabilities

2. Static Analysis (binary-re-static-analysis)
   └─ Functions, strings, xrefs, decompilation

3. Dynamic Analysis (binary-re-dynamic-analysis) - if safe
   └─ Syscalls, network, file access

4. Synthesis (binary-re-synthesis)
   └─ Structured report with evidence

Quick Reference

Essential Commands

bash
1# Fast triage 2rabin2 -I binary # Metadata 3rabin2 -l binary # Dependencies 4rabin2 -zz binary # Strings 5 6# Static analysis 7r2 -q -c 'aa; aflj' binary # Functions 8r2 -q -c 'izj' binary # Strings 9 10# Dynamic (ARM example) 11qemu-arm -L /usr/arm-linux-gnueabihf -strace ./binary

Architecture Detection

IndicatorArchitectureQEMU BinaryGhidra Processor
e_machine=EM_386 (3)x86 32-bitqemu-i386 or Docker --platform linux/i386x86:LE:32:default
e_machine=EM_ARM (40)ARM 32-bitqemu-arm or Docker --platform linux/arm/v7ARM:LE:32:v7
e_machine=EM_AARCH64 (183)ARM 64-bitqemu-aarch64 or Docker --platform linux/arm64AARCH64:LE:64:v8A
e_machine=EM_X86_64 (62)x86-64Native or Docker --platform linux/amd64x86:LE:64:default
e_machine=EM_MIPS (8)MIPS 32 LEqemu-mipselMIPS:LE:32:default
e_machine=EM_MIPS (8) BEMIPS 32 BEqemu-mipsMIPS:BE:32:default
e_machine=EM_RISCV (243)RISC-V 64qemu-riscv64RISCV:LE:64:RV64I
e_machine=EM_RISCV (243) 32RISC-V 32qemu-riscv32RISCV:LE:32:RV32I

Libc Detection

InterpreterLibc
ld-linux-armhf.so.3glibc (ARM hard-float)
ld-musl-arm.so.1musl
ld-uClibc.so.0uClibc

Error Recovery

SituationAction
Tool not foundUse binary-re-tool-setup skill
Wrong architectureRe-run triage, verify file output
QEMU failsTry Qiling, Unicorn, or on-device
Analysis timeoutReduce scope, use aa not aaa
Conflicting evidenceAsk human, document both interpretations

Documentation

See companion docs:

  • docs/r2-commands.md - Complete r2 reference for LLMs
  • docs/ghidra-headless.md - Ghidra scripting guide
  • docs/arch-adapters.md - Per-architecture quirks
  • docs/python-bytecode-re.md - Python .pyc/marshal obfuscation patterns

Integration

Works with other plugins:

  • remote-system-maintenance: Extract binaries from devices via SSH
  • fresh-eyes-review: Validate conclusions before documenting
  • scenario-testing: Create reproducible analysis environments

Related Skills

Looking for an alternative to binary-re or another community skill for your workflow? Explore these related open-source skills.

View All

openclaw-release-maintainer

Logo of openclaw
openclaw

Your own personal AI assistant. Any OS. Any Platform. The lobster way. 🦞

333.8k
0
AI

widget-generator

Logo of f
f

Generate customizable widget plugins for the prompts.chat feed system

149.6k
0
AI

flags

Logo of vercel
vercel

The React Framework

138.4k
0
Browser

pr-review

Logo of pytorch
pytorch

Tensors and Dynamic neural networks in Python with strong GPU acceleration

98.6k
0
Developer