anti-reversing-techniques
Originally fromwshobson/agents
Installation
SKILL.md
AUTHORIZED USE ONLY: This skill contains dual-use security techniques. Before proceeding with any bypass or analysis:
- Verify authorization: Confirm you have explicit written permission from the software owner, or are operating within a legitimate security context (CTF, authorized pentest, malware analysis, security research)
- Document scope: Ensure your activities fall within the defined scope of your authorization
- Legal compliance: Understand that unauthorized bypassing of software protection may violate laws (CFAA, DMCA anti-circumvention, etc.)
Legitimate use cases: Malware analysis, authorized penetration testing, CTF competitions, academic security research, analyzing software you own/have rights to
Use this skill when
- Analyzing protected binaries with explicit authorization
- Conducting malware analysis or security research in scope
- Participating in CTFs or approved training exercises
- Understanding anti-debugging or obfuscation techniques for defense
Do not use this skill when
- You lack written authorization or a defined scope
- The goal is to bypass protections for piracy or misuse
- Legal or policy restrictions prohibit analysis
Related skills
More from rmyndharis/antigravity-skills
unity-developer
Build Unity games with optimized C# scripts, efficient rendering,
1.4Kdotnet-architect
Expert .NET backend architect specializing in C#, ASP.NET Core,
265java-pro
Master Java 21+ with modern features like virtual threads, pattern
150backend-architect
Expert backend architect specializing in scalable API design,
102ios-developer
Develop native iOS applications with Swift/SwiftUI. Masters iOS 18,
95frontend-developer
Build React components, implement responsive layouts, and handle
90