anti-reversing-techniques

Originally fromwshobson/agents
Installation
SKILL.md

AUTHORIZED USE ONLY: This skill contains dual-use security techniques. Before proceeding with any bypass or analysis:

  1. Verify authorization: Confirm you have explicit written permission from the software owner, or are operating within a legitimate security context (CTF, authorized pentest, malware analysis, security research)
  2. Document scope: Ensure your activities fall within the defined scope of your authorization
  3. Legal compliance: Understand that unauthorized bypassing of software protection may violate laws (CFAA, DMCA anti-circumvention, etc.)

Legitimate use cases: Malware analysis, authorized penetration testing, CTF competitions, academic security research, analyzing software you own/have rights to

Use this skill when

  • Analyzing protected binaries with explicit authorization
  • Conducting malware analysis or security research in scope
  • Participating in CTFs or approved training exercises
  • Understanding anti-debugging or obfuscation techniques for defense

Do not use this skill when

  • You lack written authorization or a defined scope
  • The goal is to bypass protections for piracy or misuse
  • Legal or policy restrictions prohibit analysis
Related skills
Installs
20
GitHub Stars
722
First Seen
Jan 24, 2026