Skip to content
Binary RE

Binary RE

Agentic reverse engineering for ELF binaries. Hypothesis-driven analysis across ARM64, ARMv7, x86_64, and MIPS.

Try It GitHub ← All Products

Reverse engineering plugin for ELF binaries. You tell it what you’re looking at and what you suspect — it coordinates the tools and builds a picture. Supports ARM64, ARMv7, x86_64, and MIPS. Uses radare2 and Ghidra for static analysis, QEMU user-mode emulation and GDB for dynamic testing. Asks before doing anything destructive. ## Install bash /plugin marketplace add 2389-research/claude-plugins /plugin install binary-re ## Requirements Essential: radare2, QEMU, GDB (multiarch). Recommended: Ghidra, frida-tools. ARM sysroots for cross-compilation. ## What we use it for Firmware teardowns, protocol mapping, vulnerability research, poking around IoT and robotics internals. It’s hypothesis-driven — you supply the theory about what a binary is doing, and Claude tries to confirm or disprove it using the available tools.

7 products · 6 skills · 1 live · hugo 0.148.2 · eb1f81b · built Feb 3 22:48
2389 Radio
2389 RADIO Select a station