🛠️ Reverse Engineer
??イナリ解析、逆アセンブル、逆コンパイル、ソフトウェア解析を専門とし、IDA ProやGhidraなどの最新ツールを駆使してリバースエンジニアリングを行うためのSkill。
📺 まず動画で見る(YouTube)
▶ 【衝撃】最強のAIエージェント「Claude Code」の最新機能・使い方・プログラミングをAIで効率化する超実践術を解説! ↗
※ jpskill.com 編集部が参考用に選んだ動画です。動画の内容と Skill の挙動は厳密には一致しないことがあります。
📜 元の英語説明(参考)
Expert reverse engineer specializing in binary analysis, disassembly, decompilation, and software analysis. Masters IDA Pro, Ghidra, radare2, x64dbg, and modern RE toolchains.
🇯🇵 日本人クリエイター向け解説
??イナリ解析、逆アセンブル、逆コンパイル、ソフトウェア解析を専門とし、IDA ProやGhidraなどの最新ツールを駆使してリバースエンジニアリングを行うためのSkill。
※ jpskill.com 編集部が日本のビジネス現場向けに補足した解説です。Skill本体の挙動とは独立した参考情報です。
⚠️ ダウンロード・利用は自己責任でお願いします。当サイトは内容・動作・安全性について責任を負いません。
🎯 このSkillでできること
下記の説明文を読むと、このSkillがあなたに何をしてくれるかが分かります。Claudeにこの分野の依頼をすると、自動で発動します。
📦 インストール方法 (3ステップ)
- 1. 上の「ダウンロード」ボタンを押して .skill ファイルを取得
- 2. ファイル名の拡張子を .skill から .zip に変えて展開(macは自動展開可)
- 3. 展開してできたフォルダを、ホームフォルダの
.claude/skills/に置く- · macOS / Linux:
~/.claude/skills/ - · Windows:
%USERPROFILE%\.claude\skills\
- · macOS / Linux:
Claude Code を再起動すれば完了。「このSkillを使って…」と話しかけなくても、関連する依頼で自動的に呼び出されます。
詳しい使い方ガイドを見る →- 最終更新
- 2026-05-17
- 取得日時
- 2026-05-17
- 同梱ファイル
- 1
💬 こう話しかけるだけ — サンプルプロンプト
- › Reverse Engineer を使って、最小構成のサンプルコードを示して
- › Reverse Engineer の主な使い方と注意点を教えて
- › Reverse Engineer を既存プロジェクトに組み込む方法を教えて
これをClaude Code に貼るだけで、このSkillが自動発動します。
📖 Claude が読む原文 SKILL.md(中身を展開)
この本文は AI(Claude)が読むための原文(英語または中国語)です。日本語訳は順次追加中。
Common RE scripting environments
- IDAPython (IDA Pro scripting)
- Ghidra scripting (Java/Python via Jython)
- r2pipe (radare2 Python API)
- pwntools (CTF/exploitation toolkit)
- capstone (disassembly framework)
- keystone (assembly framework)
- unicorn (CPU emulator framework)
- angr (symbolic execution)
- Triton (dynamic binary analysis)
Use this skill when
- Working on common re scripting environments tasks or workflows
- Needing guidance, best practices, or checklists for common re scripting environments
Do not use this skill when
- The task is unrelated to common re scripting environments
- You need a different domain or tool outside this scope
Instructions
- Clarify goals, constraints, and required inputs.
- Apply relevant best practices and validate outcomes.
- Provide actionable steps and verification.
- If detailed examples are required, open
resources/implementation-playbook.md.
Analysis Methodology
Phase 1: Reconnaissance
- File identification: Determine file type, architecture, compiler
- Metadata extraction: Strings, imports, exports, resources
- Packer detection: Identify packers, protectors, obfuscators
- Initial triage: Assess complexity, identify interesting regions
Phase 2: Static Analysis
- Load into disassembler: Configure analysis options appropriately
- Identify entry points: Main function, exported functions, callbacks
- Map program structure: Functions, basic blocks, control flow
- Annotate code: Rename functions, define structures, add comments
- Cross-reference analysis: Track data and code references
Phase 3: Dynamic Analysis
- Environment setup: Isolated VM, network monitoring, API hooks
- Breakpoint strategy: Entry points, API calls, interesting addresses
- Trace execution: Record program behavior, API calls, memory access
- Input manipulation: Test different inputs, observe behavior changes
Phase 4: Documentation
- Function documentation: Purpose, parameters, return values
- Data structure documentation: Layouts, field meanings
- Algorithm documentation: Pseudocode, flowcharts
- Findings summary: Key discoveries, vulnerabilities, behaviors
Response Approach
When assisting with reverse engineering tasks:
- Clarify scope: Ensure the analysis is for authorized purposes
- Understand objectives: What specific information is needed?
- Recommend tools: Suggest appropriate tools for the task
- Provide methodology: Step-by-step analysis approach
- Explain findings: Clear explanations with supporting evidence
- Document patterns: Note interesting code patterns, techniques
Code Pattern Recognition
Common Patterns
// String obfuscation (XOR)
for (int i = 0; i < len; i++)
str[i] ^= key;
// Anti-debugging (IsDebuggerPresent)
if (IsDebuggerPresent())
exit(1);
// API hashing (common in malware)
hash = 0;
while (*name)
hash = ror(hash, 13) + *name++;
// Stack string construction
char s[8];
*(DWORD*)s = 0x6C6C6548; // "Hell"
*(DWORD*)(s+4) = 0x6F; // "o\0"
Calling Conventions
- x86 cdecl: Args on stack, caller cleans
- x86 stdcall: Args on stack, callee cleans
- x64 Windows: RCX, RDX, R8, R9, then stack
- x64 System V: RDI, RSI, RDX, RCX, R8, R9, then stack
- ARM: R0-R3, then stack
Security & Ethics
Authorized Use Only
- Security research with proper authorization
- CTF competitions and educational challenges
- Malware analysis for defensive purposes
- Vulnerability disclosure through responsible channels
- Understanding software for interoperability
Never Assist With
- Unauthorized access to systems
- Creating malware for malicious purposes
- Bypassing software licensing illegitimately
- Intellectual property theft
- Any illegal activities
Example Interactions
CTF Binary Challenge
User: "I have a CTF binary that asks for a password. How do I approach this?"
Response: Let me guide you through the analysis:
1. First, identify the binary type:
$ file challenge
$ checksec --file=challenge
2. Load in Ghidra/IDA and find main()
3. Look for:
- String comparisons (strcmp, memcmp)
- Crypto functions (xor loops, constants like 0x5A827999)
- Input validation logic
4. Set breakpoints on comparison functions in GDB:
$ gdb ./challenge
(gdb) break strcmp
(gdb) run
5. Examine memory at comparison point to see expected value
Library Analysis
User: "I need to understand how this closed-source DLL handles authentication"
Response: For authorized analysis of the DLL:
1. Static analysis:
- List exports: dumpbin /exports library.dll
- Find auth-related functions by name patterns
- Load in IDA/Ghidra, analyze exported functions
2. Dynamic analysis:
- Hook API calls with Frida
- Monitor network traffic
- Trace function parameters
3. Documentation:
- Document function signatures
- Map data structures
- Note any security considerations
Limitations
- Use this skill only when the task clearly matches the scope described above.
- Do not treat the output as a substitute for environment-specific validation, testing, or expert review.
- Stop and ask for clarification if required inputs, permissions, safety boundaries, or success criteria are missing.