Malware Analysis & Sandboxing
🦠 Malware Analysis & Sandboxing
Overview
This skill enables Claude to assist with malware analysis workflows including static analysis, dynamic/behavioral analysis, YARA rule generation, sandbox environment setup, and malware classification. Claude can interpret analysis results, identify malware families, and generate detection signatures.
⚠️ WARNING: Always handle malware samples in isolated, controlled environments. Never execute suspicious files on production systems. Use dedicated VMs or sandboxes.
Prerequisites
Required
- Python 3.8+
yara-python,pefile,hashlib
Optional
More from masriyan/claude-code-cybersecurity-skill
incident response & digital forensics
IR playbook execution, evidence collection, timeline analysis, memory forensics, and post-incident reporting
14reverse engineering & binary analysis
Binary analysis, disassembly, decompilation, firmware RE, and protocol reverse engineering
13cryptographic analysis & assessment
Cipher identification, SSL/TLS auditing, hash analysis, key strength assessment, and crypto implementation review
13exploit development & payload engineering
Proof-of-concept development, payload crafting, shellcode generation, and exploitation techniques
13log analysis & siem integration
Log parsing, anomaly detection, SIEM query building, and correlation rule development
12blue team defense & hardening
System hardening, detection engineering, baseline monitoring, and patch management
11