anti-reversing-techniques

Installation
Summary

Techniques for analyzing protected binaries, bypassing anti-debugging, and understanding software protection mechanisms.

  • Covers Windows and Linux anti-debugging methods including API-based detection (IsDebuggerPresent, NtQueryInformationProcess), PEB manipulation, timing checks, and exception-based techniques, with documented bypass approaches for each
  • Includes anti-VM detection strategies (CPUID fingerprinting, registry/file checks, timing anomalies) and hardening tactics for analysis environments
  • Details code obfuscation patterns: control flow flattening, opaque predicates, string encryption, API hashing, and instruction-level obfuscation with analysis and deobfuscation methods
  • Covers packing identification, dynamic unpacking methodology (OEP finding, import table fixing), and virtualization-based protection analysis using tools like x64dbg, Scylla, and symbolic execution frameworks
  • Emphasizes authorized use only for malware analysis, authorized penetration testing, CTF competitions, and security research
SKILL.md

AUTHORIZED USE ONLY: This skill contains dual-use security techniques. Before proceeding with any bypass or analysis:

  1. Verify authorization: Confirm you have explicit written permission from the software owner, or are operating within a legitimate security context (CTF, authorized pentest, malware analysis, security research)
  2. Document scope: Ensure your activities fall within the defined scope of your authorization
  3. Legal compliance: Understand that unauthorized bypassing of software protection may violate laws (CFAA, DMCA anti-circumvention, etc.)

Legitimate use cases: Malware analysis, authorized penetration testing, CTF competitions, academic security research, analyzing software you own/have rights to

Anti-Reversing Techniques

Understanding protection mechanisms encountered during authorized software analysis, security research, and malware analysis. This knowledge helps analysts bypass protections to complete legitimate analysis tasks.

For advanced techniques, see references/advanced-techniques.md


Input / Output

What you provide:

Related skills

More from wshobson/agents

Installs
6.0K
Repository
wshobson/agents
GitHub Stars
35.3K
First Seen
Jan 20, 2026