anti-reversing-techniques
Compare original and translation side by side
🇺🇸
Original
English🇨🇳
Translation
ChineseAUTHORIZED USE ONLY: This skill contains dual-use security techniques. Before proceeding with any bypass or analysis:
- Verify authorization: Confirm you have explicit written permission from the software owner, or are operating within a legitimate security context (CTF, authorized pentest, malware analysis, security research)
- Document scope: Ensure your activities fall within the defined scope of your authorization
- Legal compliance: Understand that unauthorized bypassing of software protection may violate laws (CFAA, DMCA anti-circumvention, etc.)
Legitimate use cases: Malware analysis, authorized penetration testing, CTF competitions, academic security research, analyzing software you own/have rights to
仅授权使用:本技能包含两用安全技术。在进行任何绕过或分析操作前:
- 核实授权:确认你已获得软件所有者的明确书面许可,或处于合法安全场景下操作(CTF、授权渗透测试、恶意软件分析、安全研究)
- 记录范围:确保你的活动属于已定义的授权范围内
- 合法合规:知晓未经授权绕过软件保护可能违反法律(CFAA、DMCA反规避条款等)
合法使用场景:恶意软件分析、授权渗透测试、CTF竞赛、学术安全研究、分析你拥有/有权限的软件
Use this skill when
适用场景
- Analyzing protected binaries with explicit authorization
- Conducting malware analysis or security research in scope
- Participating in CTFs or approved training exercises
- Understanding anti-debugging or obfuscation techniques for defense
- 获得明确授权后分析受保护的二进制文件
- 在授权范围内开展恶意软件分析或安全研究
- 参与CTF或经批准的训练练习
- 学习反调试或混淆技术以用于防御
Do not use this skill when
禁止使用场景
- You lack written authorization or a defined scope
- The goal is to bypass protections for piracy or misuse
- Legal or policy restrictions prohibit analysis
- 你没有书面授权或明确活动范围
- 目标是绕过保护用于盗版或滥用
- 法律或政策限制禁止开展分析
Instructions
使用说明
- Confirm written authorization, scope, and legal constraints.
- Identify protection mechanisms and choose safe analysis methods.
- Document findings and avoid modifying artifacts unnecessarily.
- Provide defensive recommendations and mitigation guidance.
- 确认书面授权、活动范围及法律约束。
- 识别保护机制并选择安全的分析方法。
- 记录发现结果,避免不必要地修改分析对象。
- 提供防御建议和缓解方案指导。
Safety
安全注意事项
- Do not share bypass steps outside the authorized context.
- Preserve evidence and maintain chain-of-custody for malware cases.
Refer to for detailed techniques and examples.
resources/implementation-playbook.md- 不要在授权场景外分享绕过步骤。
- 恶意软件分析案例中需留存证据并维护监管链。
请参考获取详细技术与示例。
resources/implementation-playbook.mdResources
相关资源
- for detailed techniques and examples.
resources/implementation-playbook.md
- :包含详细技术与示例。
resources/implementation-playbook.md