PyGhidra ARM ELF Iterative Decompilation Prompt Overview This prompt guides Claude Code Web through systematic reverse engineering of ARM ELF binaries using PyGhidra. The workflow prioritizes core application logic, skips open-source library code, and produces well-documented reconstructed source with detailed algorithm explanations.
Binary Specification
Format: ELF (Executable and Linkable Format) Architecture: ARM (32-bit ARM / Thumb / AArch64 - confirm after loading) Analysis Focus: Proprietary core functions only Skip: Standard libraries, compiler runtime, open-source components