anti-reversing-techniques

Compare original and translation side by side

🇺🇸

Original

English
🇨🇳

Translation

Chinese
AUTHORIZED USE ONLY: This skill contains dual-use security techniques. Before proceeding with any bypass or analysis:
  1. Verify authorization: Confirm you have explicit written permission from the software owner, or are operating within a legitimate security context (CTF, authorized pentest, malware analysis, security research)
  2. Document scope: Ensure your activities fall within the defined scope of your authorization
  3. Legal compliance: Understand that unauthorized bypassing of software protection may violate laws (CFAA, DMCA anti-circumvention, etc.)
Legitimate use cases: Malware analysis, authorized penetration testing, CTF competitions, academic security research, analyzing software you own/have rights to
仅授权使用:本技能包含两用安全技术。在进行任何绕过或分析操作前:
  1. 核实授权:确认你已获得软件所有者的明确书面许可,或处于合法安全场景下操作(CTF、授权渗透测试、恶意软件分析、安全研究)
  2. 记录范围:确保你的活动属于已定义的授权范围内
  3. 合法合规:知晓未经授权绕过软件保护可能违反法律(CFAA、DMCA反规避条款等)
合法使用场景:恶意软件分析、授权渗透测试、CTF竞赛、学术安全研究、分析你拥有/有权限的软件

Use this skill when

适用场景

  • Analyzing protected binaries with explicit authorization
  • Conducting malware analysis or security research in scope
  • Participating in CTFs or approved training exercises
  • Understanding anti-debugging or obfuscation techniques for defense
  • 获得明确授权后分析受保护的二进制文件
  • 在授权范围内开展恶意软件分析或安全研究
  • 参与CTF或经批准的训练练习
  • 学习反调试或混淆技术以用于防御

Do not use this skill when

禁止使用场景

  • You lack written authorization or a defined scope
  • The goal is to bypass protections for piracy or misuse
  • Legal or policy restrictions prohibit analysis
  • 你没有书面授权或明确活动范围
  • 目标是绕过保护用于盗版或滥用
  • 法律或政策限制禁止开展分析

Instructions

使用说明

  1. Confirm written authorization, scope, and legal constraints.
  2. Identify protection mechanisms and choose safe analysis methods.
  3. Document findings and avoid modifying artifacts unnecessarily.
  4. Provide defensive recommendations and mitigation guidance.
  1. 确认书面授权、活动范围及法律约束。
  2. 识别保护机制并选择安全的分析方法。
  3. 记录发现结果,避免不必要地修改分析对象。
  4. 提供防御建议和缓解方案指导。

Safety

安全注意事项

  • Do not share bypass steps outside the authorized context.
  • Preserve evidence and maintain chain-of-custody for malware cases.
Refer to
resources/implementation-playbook.md
for detailed techniques and examples.
  • 不要在授权场景外分享绕过步骤。
  • 恶意软件分析案例中需留存证据并维护监管链。
请参考
resources/implementation-playbook.md
获取详细技术与示例。

Resources

相关资源

  • resources/implementation-playbook.md
    for detailed techniques and examples.
  • resources/implementation-playbook.md
    :包含详细技术与示例。