reverse-engineering-tools by gmh5225/awesome-game-security
npx skills add https://github.com/gmh5225/awesome-game-security --skill reverse-engineering-tools本技能涵盖游戏安全研究中的逆向工程工作流程,包括受保护的游戏客户端、反作弊用户模式模块、内核驱动程序、内存痕迹以及必须通过反分析检查的调试环境。
Cheat > DebuggingCheat > RE ToolsCheat > Dynamic Binary InstrumentationCheat > Fix VMPCheat > Fix ThemidaCheat > Fix OLLVMAnti Cheat > Anti DebuggingAnti Cheat > Dump Fix广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
Anti Cheat > Winows User Dump AnalysisAnti Cheat > Winows Kernel Dump Analysis- Cheat Engine: 模式扫描、数值搜索
- ReClass.NET: 结构重建
- Process Hacker: 系统分析
- KsDumper: 内核空间进程转储工具
- PE-bear: PE 文件分析工具
- ImHex: 用于逆向工程的十六进制编辑器
GameAssembly.dll 或托管 DLLs1. 识别保护措施
2. 确定游戏引擎和版本
3. 收集可用的符号信息
4. 绘制关键模块、回调和信任边界图
1. 定位目标功能
2. 跟踪执行流程
3. 记录结构、内存痕迹和关系
4. 关联 IOCTL、回调和运行时检查
重要提示 : 本技能提供概念性指导和概述信息。如需详细信息,请使用以下来源:
获取主 README 文件以查看完整的精选仓库、工具和描述列表:
https://raw.githubusercontent.com/gmh5225/awesome-game-security/refs/heads/main/README.md
主 README 文件包含数千个按类别组织的精选链接。当用户询问特定工具、项目或实现时,请从此来源检索并引用相应部分。
对于详细的仓库信息,项目维护了一个本地存档。如果某个仓库已被存档,应优先从存档中获取,而不是直接克隆或浏览 GitHub。
存档 URL 格式:
https://raw.githubusercontent.com/gmh5225/awesome-game-security/refs/heads/main/archive/{owner}/{repo}.txt
示例:
https://raw.githubusercontent.com/gmh5225/awesome-game-security/refs/heads/main/archive/ufrisk/pcileech.txt
https://raw.githubusercontent.com/gmh5225/awesome-game-security/refs/heads/main/archive/000-aki-000/GameDebugMenu.txt
使用方法:
{owner} 替换为 GitHub 用户名/组织,将 {repo} 替换为仓库名称。code2prompt 生成的完整代码快照,包括文件树和源代码。对于仓库功能的简明英文摘要,项目维护了自动生成的描述文件。
描述 URL 格式:
https://raw.githubusercontent.com/gmh5225/awesome-game-security/refs/heads/main/description/{owner}/{repo}/description_en.txt
示例:
https://raw.githubusercontent.com/gmh5225/awesome-game-security/refs/heads/main/description/00christian00/UnityDecompiled/description_en.txt
https://raw.githubusercontent.com/gmh5225/awesome-game-security/refs/heads/main/description/ufrisk/pcileech/description_en.txt
使用方法:
{owner} 替换为 GitHub 用户名/组织,将 {repo} 替换为仓库名称。回答关于特定仓库问题时的优先级顺序:
每周安装次数
135
仓库
GitHub 星标数
2.8K
首次出现
2026年1月22日
安全审计
安装于
opencode110
gemini-cli102
codex92
claude-code89
github-copilot82
cursor76
This skill covers reverse engineering workflows for game security research, including protected game clients, anti-cheat user-mode modules, kernel drivers, memory artifacts, and debugging environments that must survive anti-analysis checks.
Cheat > DebuggingCheat > RE ToolsCheat > Dynamic Binary InstrumentationCheat > Fix VMPCheat > Fix ThemidaCheat > Fix OLLVMAnti Cheat > Anti DebuggingAnti Cheat > Dump FixAnti Cheat > Winows User Dump AnalysisAnti Cheat > Winows Kernel Dump Analysis- Cheat Engine: Pattern scanning, value searching
- ReClass.NET: Structure reconstruction
- Process Hacker: System analysis
- KsDumper: Kernel-space process dumping
- PE-bear: PE file analysis
- ImHex: Hex editor for RE
GameAssembly.dll (IL2CPP) or managed DLLs1. Identify protections (packer, obfuscator, anti-cheat)
2. Determine game engine and version
3. Collect symbol information if available
4. Map out key modules, callbacks, and trust boundaries
1. Locate target functionality
2. Trace execution flow
3. Document structures, memory artifacts, and relationships
4. Correlate IOCTLs, callbacks, and runtime checks
Important : This skill provides conceptual guidance and overview information. For detailed information use the following sources:
Fetch the main README for the full curated list of repositories, tools, and descriptions:
https://raw.githubusercontent.com/gmh5225/awesome-game-security/refs/heads/main/README.md
The main README contains thousands of curated links organized by category. When users ask for specific tools, projects, or implementations, retrieve and reference the appropriate sections from this source.
For detailed repository information (file structure, source code, implementation details), the project maintains a local archive. If a repository has been archived, always prefer fetching from the archive over cloning or browsing GitHub directly.
Archive URL format:
https://raw.githubusercontent.com/gmh5225/awesome-game-security/refs/heads/main/archive/{owner}/{repo}.txt
Examples:
https://raw.githubusercontent.com/gmh5225/awesome-game-security/refs/heads/main/archive/ufrisk/pcileech.txt
https://raw.githubusercontent.com/gmh5225/awesome-game-security/refs/heads/main/archive/000-aki-000/GameDebugMenu.txt
How to use:
{owner} with the GitHub username/org and {repo} with the repository name (no .git suffix).code2prompt.For a concise English summary of what a repository does, the project maintains auto-generated description files.
Description URL format:
https://raw.githubusercontent.com/gmh5225/awesome-game-security/refs/heads/main/description/{owner}/{repo}/description_en.txt
Examples:
https://raw.githubusercontent.com/gmh5225/awesome-game-security/refs/heads/main/description/00christian00/UnityDecompiled/description_en.txt
https://raw.githubusercontent.com/gmh5225/awesome-game-security/refs/heads/main/description/ufrisk/pcileech/description_en.txt
How to use:
{owner} with the GitHub username/org and {repo} with the repository name.Priority order when answering questions about a specific repository:
Weekly Installs
135
Repository
GitHub Stars
2.8K
First Seen
Jan 22, 2026
Security Audits
Gen Agent Trust HubPassSocketWarnSnykWarn
Installed on
opencode110
gemini-cli102
codex92
claude-code89
github-copilot82
cursor76
xdrop 文件传输脚本:Bun 环境下安全上传下载工具,支持加密分享
33,800 周安装
ASP.NET Core 开发指南:Web API、身份验证、中间件与性能优化实战
134 周安装
agent-browser 浏览器自动化工具 - 快速网页交互与测试命令行工具
134 周安装
find-skills技能:AI智能体技能搜索与安装工具,扩展Claude能力
134 周安装
Azure Functions 最佳实践指南:独立工作进程、Node.js/Python 编程模型与反模式详解
134 周安装
gentle-teaching 温和教学框架:AI辅助学习指南,培养独立解决问题能力
134 周安装
Symfony Scheduler 异步任务调度器:实现稳定重试与失败传输的工作流
134 周安装