vulnerable-secret

Installation
SKILL.md

Vulnerable Secret Extraction

Overview

This skill provides a systematic methodology for extracting secrets (flags, keys, passwords) from protected or obfuscated binary executables. It emphasizes methodical analysis, proper verification of findings, and avoiding common pitfalls in binary reverse engineering.

Systematic Analysis Workflow

Follow these phases in order for reliable results:

Phase 1: Initial Reconnaissance

Gather basic information about the target before deeper analysis:

  1. File type identification - Determine binary format (ELF, PE, Mach-O)
    file <binary>
    
Related skills

More from letta-ai/skills

Installs
33
Repository
letta-ai/skills
GitHub Stars
97
First Seen
Jan 24, 2026