{"id":"70e74729-301b-454a-b957-4175921f9f76","shortId":"JW9Dth","kind":"skill","title":"anti-reversing-techniques","tagline":"AUTHORIZED USE ONLY: This skill contains dual-use security techniques. Before proceeding with any bypass or analysis: > 1.","description":"> **AUTHORIZED USE ONLY**: This skill contains dual-use security techniques. Before proceeding with any bypass or analysis:\n> 1. **Verify authorization**: Confirm you have explicit written permission from the software owner, or are operating within a legitimate security context (CTF, authorized pentest, malware analysis, security research)\n> 2. **Document scope**: Ensure your activities fall within the defined scope of your authorization\n> 3. **Legal compliance**: Understand that unauthorized bypassing of software protection may violate laws (CFAA, DMCA anti-circumvention, etc.)\n>\n> **Legitimate use cases**: Malware analysis, authorized penetration testing, CTF competitions, academic security research, analyzing software you own/have rights to\n\n## Use this skill when\n\n- Analyzing protected binaries with explicit authorization\n- Conducting malware analysis or security research in scope\n- Participating in CTFs or approved training exercises\n- Understanding anti-debugging or obfuscation techniques for defense\n\n## Do not use this skill when\n\n- You lack written authorization or a defined scope\n- The goal is to bypass protections for piracy or misuse\n- Legal or policy restrictions prohibit analysis\n\n## Instructions\n\n1. Confirm written authorization, scope, and legal constraints.\n2. Identify protection mechanisms and choose safe analysis methods.\n3. Document findings and avoid modifying artifacts unnecessarily.\n4. Provide defensive recommendations and mitigation guidance.\n\n## Safety\n\n- Do not share bypass steps outside the authorized context.\n- Preserve evidence and maintain chain-of-custody for malware cases.\n\nRefer to `resources/implementation-playbook.md` for detailed techniques and examples.\n\n## Resources\n\n- `resources/implementation-playbook.md` for detailed techniques and examples.\n\n## Limitations\n- Use this skill only when the task clearly matches the scope described above.\n- Do not treat the output as a substitute for environment-specific validation, testing, or expert review.\n- Stop and ask for clarification if required inputs, permissions, safety boundaries, or success criteria are missing.","tags":["anti","reversing","techniques","antigravity","awesome","skills","sickn33","agent-skills","agentic-skills","ai-agent-skills","ai-agents","ai-coding"],"capabilities":["skill","source-sickn33","skill-anti-reversing-techniques","topic-agent-skills","topic-agentic-skills","topic-ai-agent-skills","topic-ai-agents","topic-ai-coding","topic-ai-workflows","topic-antigravity","topic-antigravity-skills","topic-claude-code","topic-claude-code-skills","topic-codex-cli","topic-codex-skills"],"categories":["antigravity-awesome-skills"],"synonyms":[],"warnings":[],"endpointUrl":"https://skills.sh/sickn33/antigravity-awesome-skills/anti-reversing-techniques","protocol":"skill","transport":"skills-sh","auth":{"type":"none","details":{"cli":"npx skills add sickn33/antigravity-awesome-skills","source_repo":"https://github.com/sickn33/antigravity-awesome-skills","install_from":"skills.sh"}},"qualityScore":"0.700","qualityRationale":"deterministic score 0.70 from registry signals: · indexed on github topic:agent-skills · 34964 github stars · SKILL.md body (2,130 chars)","verified":false,"liveness":"unknown","lastLivenessCheck":null,"agentReviews":{"count":0,"score_avg":null,"cost_usd_avg":null,"success_rate":null,"latency_p50_ms":null,"narrative_summary":null,"summary_updated_at":null},"enrichmentModel":"deterministic:skill-github:v1","enrichmentVersion":1,"enrichedAt":"2026-04-25T00:50:26.281Z","embedding":null,"createdAt":"2026-04-18T21:31:01.971Z","updatedAt":"2026-04-25T00:50:26.281Z","lastSeenAt":"2026-04-25T00:50:26.281Z","tsv":"'1':23,42,187 '2':70,195 '3':84,204 '4':212 'academ':113 'activ':75 'analysi':22,41,67,107,134,185,202 'analyz':116,126 'anti':2,100,149 'anti-circumvent':99 'anti-debug':148 'anti-reversing-techniqu':1 'approv':144 'artifact':210 'ask':288 'author':5,24,44,64,83,108,131,165,190,227 'avoid':208 'binari':128 'boundari':296 'bypass':20,39,90,174,223 'case':105,239 'cfaa':97 'chain':234 'chain-of-custodi':233 'choos':200 'circumvent':101 'clarif':290 'clear':263 'competit':112 'complianc':86 'conduct':132 'confirm':45,188 'constraint':194 'contain':10,29 'context':62,228 'criteria':299 'ctf':63,111 'ctfs':142 'custodi':236 'debug':150 'defens':155,214 'defin':79,168 'describ':267 'detail':244,251 'dmca':98 'document':71,205 'dual':12,31 'dual-us':11,30 'ensur':73 'environ':279 'environment-specif':278 'etc':102 'evid':230 'exampl':247,254 'exercis':146 'expert':284 'explicit':48,130 'fall':76 'find':206 'goal':171 'guidanc':218 'identifi':196 'input':293 'instruct':186 'lack':163 'law':96 'legal':85,180,193 'legitim':60,103 'limit':255 'maintain':232 'malwar':66,106,133,238 'match':264 'may':94 'mechan':198 'method':203 'miss':301 'misus':179 'mitig':217 'modifi':209 'obfusc':152 'oper':57 'output':273 'outsid':225 'own/have':119 'owner':54 'particip':140 'penetr':109 'pentest':65 'permiss':50,294 'piraci':177 'polici':182 'preserv':229 'proceed':17,36 'prohibit':184 'protect':93,127,175,197 'provid':213 'recommend':215 'refer':240 'requir':292 'research':69,115,137 'resourc':248 'resources/implementation-playbook.md':242,249 'restrict':183 'revers':3 'review':285 'right':120 'safe':201 'safeti':219,295 'scope':72,80,139,169,191,266 'secur':14,33,61,68,114,136 'share':222 'skill':9,28,124,160,258 'skill-anti-reversing-techniques' 'softwar':53,92,117 'source-sickn33' 'specif':280 'step':224 'stop':286 'substitut':276 'success':298 'task':262 'techniqu':4,15,34,153,245,252 'test':110,282 'topic-agent-skills' 'topic-agentic-skills' 'topic-ai-agent-skills' 'topic-ai-agents' 'topic-ai-coding' 'topic-ai-workflows' 'topic-antigravity' 'topic-antigravity-skills' 'topic-claude-code' 'topic-claude-code-skills' 'topic-codex-cli' 'topic-codex-skills' 'train':145 'treat':271 'unauthor':89 'understand':87,147 'unnecessarili':211 'use':6,13,25,32,104,122,158,256 'valid':281 'verifi':43 'violat':95 'within':58,77 'written':49,164,189","prices":[{"id":"3cac8bdb-fa59-49b1-89cb-8f0a77c6e95f","listingId":"70e74729-301b-454a-b957-4175921f9f76","amountUsd":"0","unit":"free","nativeCurrency":null,"nativeAmount":null,"chain":null,"payTo":null,"paymentMethod":"skill-free","isPrimary":true,"details":{"org":"sickn33","category":"antigravity-awesome-skills","install_from":"skills.sh"},"createdAt":"2026-04-18T21:31:01.971Z"}],"sources":[{"listingId":"70e74729-301b-454a-b957-4175921f9f76","source":"github","sourceId":"sickn33/antigravity-awesome-skills/anti-reversing-techniques","sourceUrl":"https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/anti-reversing-techniques","isPrimary":false,"firstSeenAt":"2026-04-18T21:31:01.971Z","lastSeenAt":"2026-04-25T00:50:26.281Z"}],"details":{"listingId":"70e74729-301b-454a-b957-4175921f9f76","quickStartSnippet":null,"exampleRequest":null,"exampleResponse":null,"schema":null,"openapiUrl":null,"agentsTxtUrl":null,"citations":[],"useCases":[],"bestFor":[],"notFor":[],"kindDetails":{"org":"sickn33","slug":"anti-reversing-techniques","github":{"repo":"sickn33/antigravity-awesome-skills","stars":34964,"topics":["agent-skills","agentic-skills","ai-agent-skills","ai-agents","ai-coding","ai-workflows","antigravity","antigravity-skills","claude-code","claude-code-skills","codex-cli","codex-skills","cursor","cursor-skills","developer-tools","gemini-cli","gemini-skills","kiro","mcp","skill-library"],"license":"mit","html_url":"https://github.com/sickn33/antigravity-awesome-skills","pushed_at":"2026-04-24T06:41:17Z","description":"Installable GitHub library of 1,400+ agentic skills for Claude Code, Cursor, Codex CLI, Gemini CLI, Antigravity, and more. Includes installer CLI, bundles, workflows, and official/community skill collections.","skill_md_sha":"466adaacab66b671afc6a383a4897b6a886f4b99","skill_md_path":"skills/anti-reversing-techniques/SKILL.md","default_branch":"main","skill_tree_url":"https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/anti-reversing-techniques"},"layout":"multi","source":"github","category":"antigravity-awesome-skills","frontmatter":{"name":"anti-reversing-techniques","description":"AUTHORIZED USE ONLY: This skill contains dual-use security techniques. Before proceeding with any bypass or analysis: > 1."},"skills_sh_url":"https://skills.sh/sickn33/antigravity-awesome-skills/anti-reversing-techniques"},"updatedAt":"2026-04-25T00:50:26.281Z"}}