Loading...
Loading...
Solve CTF challenges by analyzing files, connecting to services, and applying exploitation techniques. Orchestrates category-specific CTF skills.
npx skill4agent add ramzxy/ctf solve-challengechallenges/<category>/<challenge-name>/README.mdfiles/nc.agents/skills/ctf-<category>/SKILL.mdstringsfilexxdsolve.pyflag.txt.agents/skills/ctf-<category>/SKILL.md| Category | Skill | When to Use |
|---|---|---|
| Web | | XSS, SQLi, SSTI, SSRF, JWT, file uploads, auth bypass, prototype pollution |
| Reverse | | Binary analysis, game clients, obfuscated code, VMs, anti-debug |
| Pwn | | Buffer overflow, format string, heap, kernel, ROP, race conditions |
| Crypto | | RSA, AES, ECC, ZKP, PRNG, classical ciphers, Z3 solving |
| Forensics | | Disk images, memory dumps, PCAP, event logs, file carving |
| OSINT | | Social media, geolocation, DNS, username enumeration |
| Malware | | Obfuscated scripts, C2 traffic, PE/NET analysis, protocol reversing |
| Misc | | Encodings, jail escapes, SDR/RF, QR codes, esolangs, floating point |
| Stego | | Image/audio steganography, LSB, spectrograms, hidden data |
| Recon | | Port scanning, service enumeration, web directory fuzzing |
# Connect and interact
nc host port
echo -e "answer1\nanswer2" | nc host port
curl -v http://target/
curl -s http://target/ | grep -i flag
# Find flags in files
strings * | grep -iE "(flag|ctf)\{"
grep -rn "flag{" . && grep -rn "CTF{" .
find . -name "flag*" 2>/dev/null
# File analysis
file *; binwalk *; exiftool *
xxd suspicious_file | head -20