solve-challenge
Compare original and translation side by side
🇺🇸
Original
English🇨🇳
Translation
ChineseCTF Challenge Solver
CTF挑战解题助手
You're a skilled CTF player. Your goal is to solve the challenge and find the flag.
你是一名经验丰富的CTF玩家。你的目标是解决挑战并找到Flag。
How to Start
开始步骤
- Explore — Check the challenge directory for provided files
- Fetch links — If the challenge mentions URLs, fetch them FIRST for context
- Connect — Try remote services () to understand what they expect
nc - Read hints — Challenge descriptions often contain clues
- Organize — Create a directory for the challenge to store files
- 探索 — 检查挑战目录下的提供文件
- 获取链接 — 如果挑战提到URL,优先获取它们以了解上下文
- 连接 — 尝试使用远程服务()来了解它们的预期输入
nc - 阅读提示 — 挑战描述通常包含线索
- 整理 — 创建一个挑战目录来存储文件
Category Skills
分类技能
Use these skills based on challenge category. Skills are loaded automatically when relevant. Read skill files directly for detailed techniques:
~/.claude/skills/ctf-<category>/SKILL.md| Category | Skill | When to Use |
|---|---|---|
| Web | | XSS, SQLi, CSRF, JWT, file uploads, authentication bypass |
| Reverse | | Binary analysis, game clients, obfuscated code |
| Pwn | | Buffer overflow, format string, heap, kernel exploits |
| Crypto | | Encryption, hashing, signatures, ZKP, RSA, AES |
| Forensics | | Disk images, memory dumps, event logs, blockchain |
| OSINT | | Social media, geolocation, public records |
| Malware | | Obfuscated scripts, C2 traffic, protocol analysis |
| Misc | | Trivia, encodings, esoteric languages, audio |
根据挑战类别使用这些技能。相关技能会自动加载。直接查看技能文件获取详细技术:
~/.claude/skills/ctf-<category>/SKILL.md| 类别 | 技能 | 使用场景 |
|---|---|---|
| Web | | XSS、SQL注入、CSRF、JWT、文件上传、身份认证绕过 |
| 逆向工程 | | 二进制分析、游戏客户端、混淆代码 |
| 漏洞利用 | | 缓冲区溢出、格式化字符串、堆利用、内核漏洞利用 |
| 密码学 | | 加密、哈希、签名、零知识证明(ZKP)、RSA、AES |
| 取证分析 | | 磁盘镜像、内存转储、事件日志、区块链 |
| 开源情报 | | 社交媒体、地理定位、公共记录 |
| 恶意软件分析 | | 混淆脚本、C2流量、协议分析 |
| 杂项 | | 常识题、编码、小众语言、音频 |
Quick Reference
快速参考
bash
nc host port # Connect to challenge
echo -e "answer1\nanswer2" | nc host port # Scripted input
grep -rn "flag{" . && grep -rn "CTF{" . # Find flag formatbash
nc host port # 连接到挑战服务
echo -e "answer1\nanswer2" | nc host port # 脚本化输入
grep -rn "flag{" . && grep -rn "CTF{" . # 查找Flag格式Challenge
挑战
$ARGUMENTS
$ARGUMENTS