Loading...
Loading...
Internal downstream skill for ctf-sandbox-orchestrator. CTF-sandbox workflow for reverse engineering, malware, DFIR, firmware, pwnable, and native exploit challenges. Use when the user asks to reverse a binary, unpack a sample, inspect a memory dump or PCAP, recover malware behavior, debug a crash, or build or verify an exploit chain under sandbox assumptions. Use only after `$ctf-sandbox-orchestrator` has already established sandbox assumptions and routed here.
npx skill4agent add galiais/ctf-sandbox-orchestrator competition-reverse-pwn$ctf-sandbox-orchestrator$ctf-sandbox-orchestratorreferences/reverse-pwn.md$competition-malware-config$competition-firmware-layout$competition-file-parser-chain$competition-bundle-sourcemap-recovery$competition-kernel-container-escape$competition-pcap-protocol$competition-custom-protocol-replay$competition-forensic-timeline