Covers the essential patterns you need when reverse engineering binaries, from recognizing function prologues and calling conventions across x86-64, ARM32, and ARM64 to identifying control flow structures like loops and switch statements. Includes concrete examples for data structure access, string operations, and arithmetic optimizations that compilers typically generate. The decompilation section shows how to recover variable types and function signatures, while the tool-specific patterns for Ghidra and IDA Pro help automate analysis tasks. Most useful when you're staring at disassembly trying to understand what the original C code looked like, or when you need to quickly identify common code patterns in malware or proprietary software.
npx skills add https://github.com/wshobson/agents --skill binary-analysis-patterns