deobf-string
Installation
SKILL.md
Deobfuscate Strings
Prerequisites
Before starting analysis, check if IDA Pro MCP is connected. Use the MCP tool to verify the connection. If IDA Pro MCP is not available, inform the user:
IDA Pro MCP is not connected. Please open IDA Pro with the MCP plugin loaded and ensure the MCP server is running, then try again.
Workflow
Step 1: Identify Encrypted Strings
Analyze the user-provided code snippet or function to identify string encryption patterns:
- Look for byte arrays or data references that appear to be encrypted strings
- Identify the decryption routine (often called at string usage sites)
- Determine the encryption algorithm by reverse-engineering the decryption function
Related skills