ghidra-headless

Installation
SKILL.md

Ghidra Headless Analysis

Perform automated reverse engineering using Ghidra's analyzeHeadless tool. Import binaries, run analysis, decompile to C code, and extract useful information.

When to Use

  • Decompiling a binary to C pseudocode for review
  • Extracting function signatures, strings, or symbols from executables
  • Analyzing call graphs to understand binary control flow
  • Triaging unknown binaries or firmware images
  • Batch-analyzing multiple binaries for comparison
  • Security auditing compiled code without source access

When NOT to Use

  • Source code is available — read it directly instead
  • Interactive debugging is needed — use GDB, LLDB, or Ghidra GUI
Related skills
Installs
92
GitHub Stars
396
First Seen
Feb 16, 2026