Reverse engineering plugin for ELF binaries. You tell it what you’re looking at
and what you suspect — it coordinates the tools and builds a picture. Supports
ARM64, ARMv7, x86_64, and MIPS. Uses radare2 and Ghidra for static analysis,
QEMU user-mode emulation and GDB for dynamic testing. Asks before doing anything
destructive. ## Install bash /plugin marketplace add 2389-research/claude-plugins /plugin install binary-re ## Requirements
Essential: radare2, QEMU, GDB (multiarch). Recommended: Ghidra, frida-tools. ARM
sysroots for cross-compilation. ## What we use it for Firmware teardowns,
protocol mapping, vulnerability research, poking around IoT and robotics
internals. It’s hypothesis-driven — you supply the theory about what a binary is
doing, and Claude tries to confirm or disprove it using the available tools.
Binary RE
Agentic reverse engineering for ELF binaries. Hypothesis-driven analysis across ARM64, ARMv7, x86_64, and MIPS.
