Files
2026-04-14 00:14:42 +02:00

1.4 KiB

name, description, risk, source, date_added
name description risk source date_added
protocol-reverse-engineering Comprehensive techniques for capturing, analyzing, and documenting network protocols for security research, interoperability, and debugging. safe community 2026-02-27

Protocol Reverse Engineering

Comprehensive techniques for capturing, analyzing, and documenting network protocols for security research, interoperability, and debugging.

Use this skill when

  • Working on protocol reverse engineering tasks or workflows
  • Needing guidance, best practices, or checklists for protocol reverse engineering

Do not use this skill when

  • The task is unrelated to protocol reverse engineering
  • You need a different domain or tool outside this scope

Instructions

  • Clarify goals, constraints, and required inputs.
  • Apply relevant best practices and validate outcomes.
  • Provide actionable steps and verification.
  • If detailed examples are required, open resources/implementation-playbook.md.

Resources

  • resources/implementation-playbook.md for detailed patterns and examples.

Limitations

  • Use this skill only when the task clearly matches the scope described above.
  • Do not treat the output as a substitute for environment-specific validation, testing, or expert review.
  • Stop and ask for clarification if required inputs, permissions, safety boundaries, or success criteria are missing.