mirror of
https://github.com/wshobson/agents.git
synced 2026-03-18 17:47:16 +00:00
style: format all files with prettier
This commit is contained in:
@@ -4,6 +4,7 @@ description: Understand anti-reversing, obfuscation, and protection techniques e
|
||||
---
|
||||
|
||||
> **AUTHORIZED USE ONLY**: This skill contains dual-use security techniques. Before proceeding with any bypass or analysis:
|
||||
>
|
||||
> 1. **Verify authorization**: Confirm you have explicit written permission from the software owner, or are operating within a legitimate security context (CTF, authorized pentest, malware analysis, security research)
|
||||
> 2. **Document scope**: Ensure your activities fall within the defined scope of your authorization
|
||||
> 3. **Legal compliance**: Understand that unauthorized bypassing of software protection may violate laws (CFAA, DMCA anti-circumvention, etc.)
|
||||
@@ -58,6 +59,7 @@ if (debugFlags == 0) exit(1); // 0 means being debugged
|
||||
```
|
||||
|
||||
**Bypass Approaches:**
|
||||
|
||||
```python
|
||||
# x64dbg: ScyllaHide plugin
|
||||
# Patches common anti-debug checks
|
||||
@@ -96,6 +98,7 @@ if (*heapFlags & 0x50000062) exit(1);
|
||||
```
|
||||
|
||||
**Bypass Approaches:**
|
||||
|
||||
```assembly
|
||||
; In debugger, modify PEB directly
|
||||
; x64dbg: dump at gs:[60] (x64) or fs:[30] (x86)
|
||||
@@ -128,6 +131,7 @@ if (GetTickCount() - start > 1000) exit(1);
|
||||
```
|
||||
|
||||
**Bypass Approaches:**
|
||||
|
||||
```
|
||||
- Use hardware breakpoints instead of software
|
||||
- Patch timing checks
|
||||
@@ -185,6 +189,7 @@ if (getppid() != 1 && strcmp(get_process_name(getppid()), "bash") != 0) {
|
||||
```
|
||||
|
||||
**Bypass Approaches:**
|
||||
|
||||
```bash
|
||||
# LD_PRELOAD to hook ptrace
|
||||
# Compile: gcc -shared -fPIC -o hook.so hook.c
|
||||
@@ -252,6 +257,7 @@ if ((end - start) > 500) {
|
||||
```
|
||||
|
||||
**Bypass Approaches:**
|
||||
|
||||
```
|
||||
- Use bare-metal analysis environment
|
||||
- Harden VM (remove guest tools, change MAC)
|
||||
@@ -297,6 +303,7 @@ while (1) {
|
||||
```
|
||||
|
||||
**Analysis Approach:**
|
||||
|
||||
- Identify state variable
|
||||
- Map state transitions
|
||||
- Reconstruct original flow
|
||||
@@ -320,6 +327,7 @@ if ((x * (x + 1)) % 2 == 1) { // Product of consecutive = even
|
||||
```
|
||||
|
||||
**Analysis Approach:**
|
||||
|
||||
- Identify constant expressions
|
||||
- Symbolic execution to prove predicates
|
||||
- Pattern matching for known opaque predicates
|
||||
@@ -347,6 +355,7 @@ url[4] = ':'; url[5] = '/'; url[6] = '/';
|
||||
```
|
||||
|
||||
**Analysis Approach:**
|
||||
|
||||
```python
|
||||
# FLOSS for automatic string deobfuscation
|
||||
floss malware.exe
|
||||
@@ -383,6 +392,7 @@ DWORD hash_api(char *name) {
|
||||
```
|
||||
|
||||
**Analysis Approach:**
|
||||
|
||||
- Identify hash algorithm
|
||||
- Build hash database of known APIs
|
||||
- Use HashDB plugin for IDA
|
||||
@@ -535,6 +545,7 @@ Symbolic execution: angr, Triton
|
||||
### Ethical Considerations
|
||||
|
||||
This knowledge should only be used for:
|
||||
|
||||
- Authorized security research
|
||||
- Malware analysis (defensive)
|
||||
- CTF competitions
|
||||
@@ -542,6 +553,7 @@ This knowledge should only be used for:
|
||||
- Educational purposes
|
||||
|
||||
Never use to bypass protections for:
|
||||
|
||||
- Software piracy
|
||||
- Unauthorized access
|
||||
- Malicious purposes
|
||||
|
||||
Reference in New Issue
Block a user