From antigravity-awesome-skills
Provides authorized techniques for analyzing anti-reversing, anti-debugging, and obfuscation in protected binaries during malware analysis, pentests, CTFs, or security research.
npx claudepluginhub sickn33/antigravity-awesome-skillsThis skill uses the workspace's default tool permissions.
> **AUTHORIZED USE ONLY**: This skill contains dual-use security techniques. Before proceeding with any bypass or analysis:
Provides authorized techniques for analyzing anti-reversing, anti-debugging, and obfuscation in protected binaries during malware analysis, pentests, CTFs, or security research.
Analyzes anti-reversing, obfuscation, and protection techniques in protected binaries for authorized malware analysis, pentesting, CTFs, and security research.
Identifies anti-debugging checks like IsDebuggerPresent, NtQueryInformationProcess in Windows binaries; suggests bypasses via patches/hooks/scripts for malware analysis, CTFs, authorized RE.
Share bugs, ideas, or general feedback.
AUTHORIZED USE ONLY: This skill contains dual-use security techniques. Before proceeding with any bypass or analysis:
- Verify authorization: Confirm you have explicit written permission from the software owner, or are operating within a legitimate security context (CTF, authorized pentest, malware analysis, security research)
- Document scope: Ensure your activities fall within the defined scope of your authorization
- Legal compliance: Understand that unauthorized bypassing of software protection may violate laws (CFAA, DMCA anti-circumvention, etc.)
Legitimate use cases: Malware analysis, authorized penetration testing, CTF competitions, academic security research, analyzing software you own/have rights to
Refer to resources/implementation-playbook.md for detailed techniques and examples.
resources/implementation-playbook.md for detailed techniques and examples.