II.
LibraryProcess overview
Reference · livelib-process:security-research--binary-reverse-engineering
binary-reverse-engineering overview
Systematic analysis of compiled binaries without source code access. Covers static disassembly, dynamic analysis, function identification, and vulnerability discovery in closed-source software using Ghidra, IDA Pro, Binary Ninja, and debugging tools.
Attributes
displayName
binary-reverse-engineering
description
Systematic analysis of compiled binaries without source code access. Covers static disassembly,
dynamic analysis, function identification, and vulnerability discovery in closed-source software using
Ghidra, IDA Pro, Binary Ninja, and debugging tools.
libraryPath
library/specializations/security-research/binary-reverse-engineering.js
specialization
security-research
references
- - Ghidra: https://ghidra-sre.org/ - IDA Pro: https://hex-rays.com/ida-pro/ - Binary Ninja: https://binary.ninja/
example
const result = await orchestrate('specializations/security-research/binary-reverse-engineering', {
projectName: 'Firmware Binary Analysis',
binaryPath: '/path/to/binary',
architecture: 'x86_64',
analysisTools: ['ghidra', 'gdb']
});
usesAgents
- reverse-engineer
- vuln-researcher
- security-report-writer
Outgoing edges
lib_applies_to_domain1
- domain:cybersecurity·DomainCybersecurity
lib_belongs_to_specialization1
- specialization:security-research·Specialization
lib_implements_workflow1
- workflow:vulnerability-management·Workflow
uses_agent3
- lib-agent:security-research--reverse-engineer·LibraryAgentReverse Engineer Agent
- lib-agent:security-research--vuln-researcher·LibraryAgentVulnerability Researcher Agent
- lib-agent:security-research--security-report-writer·LibraryAgentSecurity Report Writer Agent
Incoming edges
None.