reverse-engineering-firmware-analysis

5 stars 1 forks
20

Firmware extraction and IoT security analysis (RE Level 5) for routers and embedded systems. Use when analyzing IoT firmware, extracting embedded filesystems (SquashFS/JFFS2/CramFS), finding hardcoded credentials, performing CVE scans, or auditing embedded system security. Handles encrypted firmware with known decryption schemes. Completes in 2-8 hours with binwalk+firmadyne+QEMU emulation.

Marketplace

Third-Party Agent Skill: Review the code before installing. Agent skills execute in your AI assistant's environment and can access your files. Learn more about security

Installation for Agentic Skill

View all platforms →
skilz install DNYoussef/context-cascade/reverse-engineering-firmware-analysis
skilz install DNYoussef/context-cascade/reverse-engineering-firmware-analysis --agent opencode
skilz install DNYoussef/context-cascade/reverse-engineering-firmware-analysis --agent codex
skilz install DNYoussef/context-cascade/reverse-engineering-firmware-analysis --agent gemini

First time? Install Skilz: pip install skilz

Works with 14 AI coding assistants

Cursor, Aider, Copilot, Windsurf, Qwen, Kimi, and more...

View All Agents
Download Agent Skill ZIP

Extract and copy to ~/.claude/skills/ then restart Claude Desktop

1. Clone the repository:
git clone https://github.com/DNYoussef/context-cascade
2. Copy the agent skill directory:
cp -r context-cascade/skills/security/reverse-engineering-firmware ~/.claude/skills/

Need detailed installation help? Check our platform-specific guides:

Related Agentic Skills

Agentic Skill Details

Stars
5
Forks
1
Type
Technical
Meta-Domain
web api
Primary Domain
security
Market Score
20

Report Security Issue

Found a security vulnerability in this agent skill?