Skip to content

hackersifu/reverse-engineering-skills

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 
 
 

Repository files navigation

reverse-engineering-skills

A public collection of agent skills for defensive reverse engineering and malware analysis workflows.

Skills are available for both Claude Code (Anthropic) and OpenAI Codex.

Prerequisites

Claude Code users

For the skills designed for use with Claude Code, you'll need the Claude Code CLI:

Claude Code discovers custom slash commands from:

.claude/commands/<skill-name>.md

Skills appear as /re-ioc-extraction and /re-unpacker in the slash command menu once the repo (or the .claude/ folder) is present in your project.

Codex users

For the skills designed for use with OpenAI Codex, you'll need one of the supported Codex clients:

Codex discovers skills from folders like:

.agents/skills/<skill-name>/SKILL.md

Skills documentation (how discovery + loading works): https://developers.openai.com/codex/skills/

Note: if you add or update skills and they don't appear in Codex, restart the Codex client you're using (CLI session, app, or IDE).

Installation

Claude Code — use in a project (recommended)

Copy or vendor the .claude/commands/ folder into the repository where you want to use them:

your-project/
  .claude/
    commands/
      re-ioc-extraction.md
      re-unpacker.md

Claude Code — use globally (optional)

Copy the command files into your user-level Claude commands directory:

~/.claude/commands/re-ioc-extraction.md
~/.claude/commands/re-unpacker.md

Codex — use in a project (recommended)

Copy or vendor this repo's skills into the repository where you want to use them:

your-project/
  .agents/
    skills/
      re-ioc-extraction/
        SKILL.md
      re-unpacker/
        SKILL.md

If you prefer, you can also add this repo as a submodule and copy/symlink specific skill folders into .agents/skills.

Codex — use globally (optional)

If your agent environment supports a user-level skills directory, you can symlink individual skill folders into your global skills path (location varies by tool/OS).

Tip: If you're unsure, start with the project-local approach. It's the easiest to share and the easiest to reason about.

Skill layout

Claude Code skills live under:

.claude/commands/<skill-name>.md

Codex skills live under:

.agents/skills/<skill-name>/SKILL.md

Each skill is meant to be standalone. As the collection grows, a skill may include optional supporting material (examples, references, scripts), but the source of truth is always the skill contract.

Available skills

Reverse engineering

Skill What it's for Inputs Outputs
re-ioc-extraction (Claude Code / Codex) Extract and normalize defensive IOCs (domains, IPs, URLs, hashes, mutexes, registry paths, file paths, user agents) from analyst-provided evidence. Evidence-first: no invented indicators. strings output, sandbox/network logs, RE notes, known hashes 1) IOC table (Markdown) 2) structured IOC list (YAML)
re-unpacker (Claude Code / Codex) Triage packing/obfuscation indicators and produce a static-first unpacking plan (dynamic steps only in a controlled sandbox). Includes a lean tool check/install flow to improve success across environments. file metadata, sections/imports/strings, (optional) sandbox notes 1) packing assessment 2) unpacking plan 3) unpacking report (artifacts + provenance) 4) next steps

Usage via Claude Code

Once the .claude/commands/ files are in your project (or ~/.claude/commands/ globally), invoke skills as slash commands directly in Claude Code:

/re-ioc-extraction
/re-unpacker

You can optionally pass evidence inline as an argument:

/re-ioc-extraction sha256: abc123... strings output: hxxp://bad[.]com/path
/re-unpacker file: PE32 executable, UPX compressed; sections: UPX0, UPX1

If no argument is provided, the skill will prompt you to paste your evidence.

Usage via agent tooling (Codex/other)

Most agent systems will choose a skill based on the request and the skill's metadata. You can also invoke it explicitly, for example:

  • Use re-ioc-extraction on this FLOSS output and produce a YAML list for hunting.
  • Extract IOCs from these sandbox logs; label confirmed vs candidate; include verbatim evidence snippets.
  • Use re-unpacker to assess whether this PE is packed; propose a static-first unpacking plan; document artifact provenance.

Usage via chat LLM (no agent tooling required)

You can test a skill with any chat LLM (ChatGPT, Claude.ai, etc.) without Codex or Claude Code.

Important: a chat model cannot read files from your local disk. To "point to the skill", you must either:

  • paste the contents of a skill file into the chat, or
  • provide a link to the skill file in this repo (and use a model/tool that can open links).

Quick test: re-ioc-extraction

Skill files: Claude Code / Codex

  1. Open either skill file and paste the entire contents into your chat.

  2. Paste the prompt:

Follow the instructions in the skill text above.
Extract IOCs from this evidence and output:
1) a Markdown table (Type, Indicator, Confidence, Context, Evidence)
2) a YAML list grouped by type

Evidence (synthetic placeholders — do not invent values):
- URL: <url-placeholder>
- Domain: <domain-placeholder>
- IP: <ip-placeholder>
- Hash: <hash-placeholder>
- Registry key/value: <registry-placeholder>
- File path: <file-path-placeholder>
- Mutex: <mutex-placeholder>

Rules for this test:
- Do not create or guess any indicator values.
- Only classify what is explicitly present in the evidence placeholders above.

Quick test: re-unpacker

Skill files: Claude Code / Codex

  1. Open either skill file and paste the entire contents into your chat.

  2. Paste the prompt:

Follow the instructions in the skill text above.
I have a suspicious binary and want to know if it looks packed/obfuscated.
If it is, provide:
1) packing assessment summary (with verbatim evidence excerpts),
2) a prioritized unpacking plan (static-first, sandbox-only dynamic if needed),
3) an unpacking report (hashes + artifacts + provenance),
4) next steps for defensive analysis.

Evidence:
- file output: <file-output-placeholder>
- hashes: <hashes-placeholder>
- strings (first 200 lines): <strings-placeholder>
- sections/imports: <sections-imports-placeholder>

Rules for this test:
- Do not suggest executing the sample on a host system.
- Do not invent artifacts or "unpacked files."
- Prefer small, single-purpose commands if you suggest evidence generation.

Scope and safety

This repo is oriented toward defensive and analyst-in-the-loop work:

  • Skills should be evidence-driven and produce outputs that are easy to validate.
  • Skills should avoid inventing indicators or "filling in gaps" with guesses.
  • Skills should not include instructions intended to enable wrongdoing.

If you find a place where a skill's wording could be misused, please open an issue. PRs are also welcome.

Contributing

Issues and PRs welcome. Helpful contributions include:

  • New skills with narrow scope and consistent output formats
  • Synthetic or sanitized examples and expected outputs
  • Improvements to normalization rules and evidence traceability

Guidelines:

  • Keep skills small and composable (prefer multiple focused skills over one mega skill)
  • Include "when to use / when not to use" cues in the skill description
  • Include a definition of done (what success looks like)
  • Provide both a Claude Code (.claude/commands/<skill-name>.md) and Codex (.agents/skills/<skill-name>/SKILL.md) version for each new skill

License

MIT (see LICENSE).

About

Skills related to reverse engineering malware, for various AIs

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors