reverse-engineering-tools by gmh5225

Guide for reverse engineering protected games and anti-cheat components across user mode, kernel mode, and hypervisor-aware environments. Use this skill when analyzing drivers, IOCTL protocols, callback registration, injected-code artifacts, integrity checks, protected binaries, or debugging security-sensitive game components.

Content & Writing
2.8K Stars
399 Forks
Updated Apr 14, 2026, 04:54 PM

Why Use This

This skill provides specialized capabilities for gmh5225's codebase.

Use Cases

  • Developing new features in the gmh5225 repository
  • Refactoring existing code to follow gmh5225 standards
  • Understanding and working with gmh5225's codebase structure

Install Guide

2 steps
  1. 1

    Download Ananke

    Skip this step if Ananke is already installed.

  2. 2

    Install inside Ananke

    Click Install Skill, paste the link below, then press Install.

    https://github.com/gmh5225/awesome-game-security/tree/main/.claude/skills/reverse-engineering

Skill Snapshot

Auto scan of skill assets. Informational only.

Valid SKILL.md

Checks against SKILL.md specification

Source & Community

Skill Version
main
Community
2.8K 399
Updated At Apr 14, 2026, 04:54 PM

Skill Stats

SKILL.md 499 Lines
Total Files 1
Total Size 16.8 KB
License MIT