Author Profile: jrzanol

Skills published by jrzanol with real stars/downloads and source-aware metadata.

Total Skills

1

Total Stars

0

Total Downloads

0

RSS Feed

Skills Performance

Comparison chart based on real stars and downloads signals from source data.

pe-disasm

0

Stars
0
Downloads
0

Published Skills

Coding

pe-disasm

Disassemble x86 32-bit Windows PE executables (.exe, .dll) at one or more virtual addresses and analyze the resulting assembly. Use this skill whenever the conversation involves reverse engineering, binary analysis, or low-level investigation of Windows binaries — including any mention of disassembling code, looking up what's at a specific address, analyzing a function, investigating crash dumps, tracing execution flow, examining packet handlers, or understanding compiled C/C++ behavior in a PE file. Trigger on any hex address (e.g. 0x00486397) referenced alongside a Windows binary, even if the user doesn't explicitly say "disassemble". Also trigger for questions like "what does this code do at X", "show me the function at Y", "analyze this binary", or any reverse-engineering workflow involving Ghidra, IDA, x64dbg, or OllyDbg output.

Repository SourceNeeds Review
Author jrzanol | V50.AI