English | 中文
Reverse engineering analysis skills, supporting 40+ AI coding agents.
Designed to work with IDA-NO-MCP - Export IDA decompilation results, then analyze with your AI coding agent.
| Skill | Description |
|---|---|
rev-symbol | Analyze function symbols from exports/imports or decompiled code |
rev-struct | Reconstruct data structures from decompiled functions |
rev-frida | Generate Frida hook scripts using modern Frida API |
rev-unicorn-debug | Debug specific code snippets using Unicorn emulator with environment simulation |
rev-dex-dumper | Dump DEX files from a running Android app's memory for unpacking |
rev-u3d-dump | Extract C# symbols from Unity IL2CPP builds, generate IDA/Ghidra import scripts |
rev-idapython | IDAPython / IDALib script reference covering debugging, memory ops, decompiler API, obfuscation helpers, and batch analysis |
rev-ios-dump | Dump decrypted iOS app binaries from jailbroken devices using frida-ios-dump for security analysis |
npx skills add P4nda0s/reverse-skills
# Check for updates
npx skills check
# Update
npx skills update
# Remove
npx skills remove rev-symbol rev-struct
MIT