Claude-skill-registry fingerprinting-binaries
Identifies binary file characteristics including compiler signatures, version information, and build environment details. Use when analyzing unknown binaries, investigating binary origins, or identifying build configurations.
install
source · Clone the upstream repo
git clone https://github.com/majiayu000/claude-skill-registry
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/majiayu000/claude-skill-registry "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/data/fingerprinting-binaries" ~/.claude/skills/majiayu000-claude-skill-registry-fingerprinting-binaries && rm -rf "$T"
manifest:
skills/data/fingerprinting-binaries/SKILL.mdsource content
Binary Fingerprinting
Detection Workflow
- Extract strings: Use
to get all strings, identify version strings, find compiler-related strings, extract build informationstrings - Analyze imports: Identify imported functions, check library dependencies, assess API usage patterns, identify OS/version
- Examine code structure: Analyze function prologues/epilogues, check for stack canaries, identify security features, assess code patterns
- Assess binary characteristics: Determine architecture, identify compiler, estimate build date, classify binary type
Key Patterns
- Compiler signatures: GCC/Clang/MSVC artifacts, compiler version indicators, optimization level signatures, standard library versions
- Build information: build timestamps, source file paths, debug symbols, build configuration strings
- Library signatures: static library linking, library version indicators, custom library usage, third-party dependencies
- Architecture features: CPU architecture (x86, ARM, MIPS), instruction set extensions (SSE, AVX, NEON), endianness (little/big), ABI
Output Format
Report with: id, type, subtype, severity, confidence, binary_info (architecture, endianness, file_type, entry_point), compiler_info (compiler, version, optimization, confidence), build_info (build_date, build_host, source_paths), libraries, security_features, recommendations.
Severity Guidelines
- INFO: Informational only, no security impact
- LOW: Outdated compiler or libraries with known issues
- MEDIUM: Missing security features
See Also
- Detailed detection patterns and exploitation scenariospatterns.md
- Example analysis cases and code samplesexamples.md
- CWE references and mitigation strategiesreferences.md