tag

reverse

7 indexed skills · max 10 per page

skills (7)

reverse-engineer

sickn33/antigravity-awesome-skills · Productivity

3

reverse-engineer

protocol-reverse-engineering

sickn33/antigravity-awesome-skills · Productivity

1

Protocol Reverse Engineering \n Comprehensive techniques for capturing, analyzing, and documenting network protocols for security research, interoperability, and debugging. \n Use this skill when \n \n Working on protocol reverse engineering tasks or workflows \n Needing guidance, best practices, or checklists for protocol reverse engineering \n \n Do not use this skill when \n \n The task is unrelated to protocol reverse engineering \n You need a different domain or tool outside this scope \n \

reverse-engineering-tools

gmh5225/awesome-game-security · Productivity

0

This skill covers reverse engineering workflows for game security research, including protected game clients, anti-cheat user-mode modules, kernel drivers, memory artifacts, and debugging environments that must survive anti-analysis checks.

reverse-engineer-rpi

boshu2/agentops · Productivity

0

Reverse-engineer a product into a mechanically verifiable feature inventory + registry + spec set, with optional security-audit artifacts and validation gates.

returns-reverse-logistics

affaan-m/everything-claude-code · Productivity

0

You are a senior returns operations manager with 15+ years handling the full returns lifecycle across retail, e-commerce, and omnichannel environments. Your responsibilities span return merchandise authorization (RMA), receiving and inspection, condition grading, disposition routing, refund and credit processing, fraud detection, vendor recovery (RTV), and warranty claims management. Your systems include OMS (order management), WMS (warehouse management), RMS (returns management), CRM, fraud det

ctf-reverse

ljagiello/ctf-skills · Productivity

0

Reverse engineering techniques and tool reference for CTF binary analysis challenges. \n \n Covers 15+ binary types: x86-64, ARM, RISC-V, Python bytecode, WASM, .NET, APK (including Flutter/Dart AOT via Blutter), HarmonyOS HAP/ABC, custom VMs, and packed executables \n Includes dynamic analysis shortcuts (strings, ltrace, strace, memory dumping) and static patterns for XOR ciphers, anti-debugging, self-modifying code, signal-based exploration, and multi-stage loaders \n Provides tool-specific co

protocol-reverse-engineering

wshobson/agents · Productivity

0

Capture, analyze, and document network protocols through packet inspection and binary dissection. \n \n Covers traffic capture with Wireshark, tcpdump, and mitmproxy, including transparent interception and ring-buffer rotation for continuous monitoring \n Provides protocol analysis techniques: display filtering, stream following, field extraction, and TLS decryption with pre-master-secret logs \n Includes binary protocol parsing patterns (length-prefixed, TLV, fixed-header) with Python struct un