anti-reversing-techniques
Sécurité & ConformitéUnderstand anti-reversing, obfuscation, and protection techniques encountered during software analysis. Use when analyzing protected binaries, bypassing anti-debugging for authorized analysis, or understanding software protection mechanisms.
Documentation
> AUTHORIZED USE ONLY: This skill contains dual-use security techniques. Before proceeding with any bypass or analysis:
> 1. Verify authorization: Confirm you have explicit written permission from the software owner, or are operating within a legitimate security context (CTF, authorized pentest, malware analysis, security research)
> 2. Document scope: Ensure your activities fall within the defined scope of your authorization
> 3. Legal compliance: Understand that unauthorized bypassing of software protection may violate laws (CFAA, DMCA anti-circumvention, etc.)
>
> Legitimate use cases: Malware analysis, authorized penetration testing, CTF competitions, academic security research, analyzing software you own/have rights to
Use this skill when
Do not use this skill when
Instructions
Safety
Refer to resources/implementation-playbook.md for detailed techniques and examples.
Resources
resources/implementation-playbook.md for detailed techniques and examples.Compétences similaires
Explorez d'autres agents de la catégorie Sécurité & Conformité
error-diagnostics-smart-debug
"Use when working with error diagnostics smart debug"
error-diagnostics-error-trace
"You are an error tracking and observability expert specializing in implementing comprehensive error monitoring solutions. Set up error tracking systems, configure alerts, implement structured logging,"
binary-analysis-patterns
Master binary analysis patterns including disassembly, decompilation, control flow analysis, and code pattern recognition. Use when analyzing executables, understanding compiled code, or performing static analysis on binaries.