style: format all files with prettier

This commit is contained in:
Seth Hobson
2026-01-19 17:07:03 -05:00
parent 8d37048deb
commit 56848874a2
355 changed files with 15215 additions and 10241 deletions

View File

@@ -4,6 +4,7 @@ description: Understand anti-reversing, obfuscation, and protection techniques e
---
> **AUTHORIZED USE ONLY**: This skill contains dual-use security techniques. Before proceeding with any bypass or analysis:
>
> 1. **Verify authorization**: Confirm you have explicit written permission from the software owner, or are operating within a legitimate security context (CTF, authorized pentest, malware analysis, security research)
> 2. **Document scope**: Ensure your activities fall within the defined scope of your authorization
> 3. **Legal compliance**: Understand that unauthorized bypassing of software protection may violate laws (CFAA, DMCA anti-circumvention, etc.)
@@ -58,6 +59,7 @@ if (debugFlags == 0) exit(1); // 0 means being debugged
```
**Bypass Approaches:**
```python
# x64dbg: ScyllaHide plugin
# Patches common anti-debug checks
@@ -96,6 +98,7 @@ if (*heapFlags & 0x50000062) exit(1);
```
**Bypass Approaches:**
```assembly
; In debugger, modify PEB directly
; x64dbg: dump at gs:[60] (x64) or fs:[30] (x86)
@@ -128,6 +131,7 @@ if (GetTickCount() - start > 1000) exit(1);
```
**Bypass Approaches:**
```
- Use hardware breakpoints instead of software
- Patch timing checks
@@ -185,6 +189,7 @@ if (getppid() != 1 && strcmp(get_process_name(getppid()), "bash") != 0) {
```
**Bypass Approaches:**
```bash
# LD_PRELOAD to hook ptrace
# Compile: gcc -shared -fPIC -o hook.so hook.c
@@ -252,6 +257,7 @@ if ((end - start) > 500) {
```
**Bypass Approaches:**
```
- Use bare-metal analysis environment
- Harden VM (remove guest tools, change MAC)
@@ -297,6 +303,7 @@ while (1) {
```
**Analysis Approach:**
- Identify state variable
- Map state transitions
- Reconstruct original flow
@@ -320,6 +327,7 @@ if ((x * (x + 1)) % 2 == 1) { // Product of consecutive = even
```
**Analysis Approach:**
- Identify constant expressions
- Symbolic execution to prove predicates
- Pattern matching for known opaque predicates
@@ -347,6 +355,7 @@ url[4] = ':'; url[5] = '/'; url[6] = '/';
```
**Analysis Approach:**
```python
# FLOSS for automatic string deobfuscation
floss malware.exe
@@ -383,6 +392,7 @@ DWORD hash_api(char *name) {
```
**Analysis Approach:**
- Identify hash algorithm
- Build hash database of known APIs
- Use HashDB plugin for IDA
@@ -535,6 +545,7 @@ Symbolic execution: angr, Triton
### Ethical Considerations
This knowledge should only be used for:
- Authorized security research
- Malware analysis (defensive)
- CTF competitions
@@ -542,6 +553,7 @@ This knowledge should only be used for:
- Educational purposes
Never use to bypass protections for:
- Software piracy
- Unauthorized access
- Malicious purposes