소개
This skill provides a comprehensive library of patterns and techniques for reverse engineering compiled executables across multiple architectures including x86-64, ARM32, and ARM64. It enables Claude to interpret assembly instructions, map high-level control flows like loops and switch statements, and reconstruct complex data structures from raw memory access patterns. Ideal for security researchers and developers working with legacy systems, it facilitates the translation of binary data back into human-readable logic while providing specialized guidance for tools like Ghidra and IDA Pro.