AUTHORIZED USE ONLY: This skill contains dual-use security techniques. Before proceeding with any bypass or analysis: Verify authorization: Confirm you have explicit written permission from the software owner, or are operating within a legitimate security context (CTF, authorized pentest, malware analysis, security research)
Document scope: Ensure your activities fall within the defined scope of your authorization Legal compliance: Understand that unauthorized bypassing of software protection may violate laws (CFAA, DMCA anti-circumvention, etc.)
Legitimate use cases: Malware analysis, authorized penetration testing, CTF competitions, academic security research, analyzing software you own/have rights to
فهم تقنيات مكافحة الانعكاس والتعتيم والحماية التي تمت مواجهتها أثناء تحليل البرامج. يُستخدم عند تحليل الثنائيات المحمية، أو تجاوز مكافحة تصحيح الأخطاء للتحليل المعتمد، أو فهم آليات حماية البرامج. المصدر: sickn33/antigravity-awesome-skills.