CtrlK
BlogDocsLog inGet started
Tessl Logo

anti-reversing-techniques

Understand anti-reversing, obfuscation, and protection techniques encountered during software analysis. Use when analyzing protected binaries, bypassing anti-debugging for authorized analysis, or u...

Install with Tessl CLI

npx tessl i github:sickn33/antigravity-awesome-skills --skill anti-reversing-techniques
What are skills?

77

Does it follow best practices?

Agent success when using this skill

Validation for skill structure

SKILL.md
Review
Evals

Evaluation results

99%

-1%

Linux Daemon Analysis — CTF Challenge

Linux anti-debug bypass and analysis

Criteria
Without context
With context

Authorization statement

100%

100%

Scope documentation

100%

100%

Identifies ptrace check

100%

100%

Identifies /proc check

100%

100%

Identifies parent check

100%

100%

LD_PRELOAD bypass approach

100%

100%

ptrace hook returns 0

100%

100%

Makefile with shared lib target

100%

100%

Usage instructions

100%

100%

Preserve original artifacts

100%

100%

Defensive recommendations

100%

100%

Evidence/chain-of-custody note

100%

90%

Without context: $0.6883 · 3m 1s · 22 turns · 22 in / 11,391 out tokens

With context: $0.7461 · 2m 54s · 26 turns · 328 in / 9,728 out tokens

100%

14%

Malware Sample Investigation — Unpacking and String Recovery

Packed binary unpacking methodology

Criteria
Without context
With context

Authorization/scope statement

71%

100%

Packer identification step

100%

100%

Static unpacking attempt

100%

100%

Dynamic unpacking workflow

100%

100%

ESP trick for OEP

10%

100%

Memory dump step

100%

100%

Import table repair

70%

100%

FLOSS recommendation

100%

100%

XOR brute-force script

100%

100%

Chain-of-custody notes

100%

100%

Defensive recommendations

100%

100%

Do not modify original artifact

100%

100%

Without context: $0.5662 · 3m 3s · 13 turns · 13 in / 8,971 out tokens

With context: $0.5760 · 3m 1s · 17 turns · 97 in / 9,192 out tokens

94%

-4%

Obfuscated Loader Analysis — Security Research Engagement

Code obfuscation analysis and reporting

Criteria
Without context
With context

Authorization/scope statement

100%

100%

Control flow analysis approach

100%

100%

CFF tools mentioned

100%

100%

Opaque predicate explanation

100%

100%

Symbolic execution for predicates

100%

100%

API hash resolution approach

100%

100%

HashDB plugin mentioned

100%

100%

XOR decryption script

100%

100%

Document findings, not modify artifacts

71%

57%

Defensive recommendations

100%

100%

Scope of sharing noted

100%

100%

Evidence handling notes

100%

70%

Without context: $0.7583 · 4m 58s · 16 turns · 16 in / 15,822 out tokens

With context: $0.9530 · 4m 45s · 25 turns · 438 in / 16,050 out tokens

Evaluated
Agent
Claude Code

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.