reverse-engineering-firmware-analysis
π―Skillfrom dnyoussef/context-cascade
Automates firmware disassembly, binary analysis, and vulnerability detection for embedded systems and IoT device security assessments.
Part of
dnyoussef/context-cascade(33 items)
Installation
/plugin marketplace add DNYoussef/context-cascade/plugin install 12fa-core/plugin install 12fa-core 12fa-three-loop 12fa-security 12fa-visual-docs 12fa-swarmnpm install -g claude-flow@alphaclaude mcp add claude-flow npx claude-flow@alpha mcp start+ 5 more commands
{
"mcpServers": {
"connascence-analyzer": {
"command": "python",
...More from this repository10
Rapidly assess software binaries, identify potential vulnerabilities, and extract critical insights using advanced reverse engineering techniques.
Performs comprehensive static and dynamic code analysis to uncover software architecture, dependencies, and potential vulnerabilities in complex systems.
Automates thorough pull request reviews by systematically analyzing code quality, architecture, performance, and potential security risks across multiple dimensions.
Automatically diagnoses and iteratively refines code errors by generating targeted fixes and validating solutions through systematic debugging techniques.
Validates and sanitizes AI-generated code snippets to prevent potential security risks and unintended execution vulnerabilities.
Automates comprehensive network and system reconnaissance by scanning, fingerprinting, and mapping infrastructure vulnerabilities and potential entry points.
Generates custom React hooks with intelligent type inference, automatic dependency tracking, and performance optimization strategies.
Rapidly onboard developers to complex codebases by generating comprehensive documentation, architecture diagrams, and dependency maps using AI analysis.
Automates web interactions like form filling, clicking, scrolling, and data extraction using Playwright and Puppeteer across multiple browsers
Streamlines feature development by generating boilerplate code, managing dependencies, and creating standardized project structures with minimal configuration.