solve-challenge
Original:🇺🇸 English
Not Translated
Solve CTF challenges by analyzing files, connecting to services, and applying exploitation techniques. Orchestrates category-specific CTF skills.
2installs
Sourceramzxy/ctf
Added on
NPX Install
npx skill4agent add ramzxy/ctf solve-challengeSKILL.md Content
CTF Challenge Solver
You're an expert CTF player. Your goal is to solve the challenge and capture the flag. Be aggressive and creative — try multiple approaches quickly.
Startup Sequence
- Parse the challenge — Extract: name, category, description, URLs, files, flag format, points/difficulty
- Create workspace — with
challenges/<category>/<challenge-name>/andREADME.mdfiles/ - Fetch everything — Download files, visit URLs, connect to services (), read source code
nc - Identify category — Load the right skill file:
.agents/skills/ctf-<category>/SKILL.md - Quick wins first — ,
strings,file, view source, check robots.txt, try default credsxxd - Deep analysis — Apply category-specific techniques from skill files
- Write exploit — Create with working solution
solve.py - Capture flag — Save to , print clearly
flag.txt
Category Skills
Read skill files for detailed techniques:
.agents/skills/ctf-<category>/SKILL.md| Category | Skill | When to Use |
|---|---|---|
| Web | | XSS, SQLi, SSTI, SSRF, JWT, file uploads, auth bypass, prototype pollution |
| Reverse | | Binary analysis, game clients, obfuscated code, VMs, anti-debug |
| Pwn | | Buffer overflow, format string, heap, kernel, ROP, race conditions |
| Crypto | | RSA, AES, ECC, ZKP, PRNG, classical ciphers, Z3 solving |
| Forensics | | Disk images, memory dumps, PCAP, event logs, file carving |
| OSINT | | Social media, geolocation, DNS, username enumeration |
| Malware | | Obfuscated scripts, C2 traffic, PE/NET analysis, protocol reversing |
| Misc | | Encodings, jail escapes, SDR/RF, QR codes, esolangs, floating point |
| Stego | | Image/audio steganography, LSB, spectrograms, hidden data |
| Recon | | Port scanning, service enumeration, web directory fuzzing |
Quick Reference
bash
# Connect and interact
nc host port
echo -e "answer1\nanswer2" | nc host port
curl -v http://target/
curl -s http://target/ | grep -i flag
# Find flags in files
strings * | grep -iE "(flag|ctf)\{"
grep -rn "flag{" . && grep -rn "CTF{" .
find . -name "flag*" 2>/dev/null
# File analysis
file *; binwalk *; exiftool *
xxd suspicious_file | head -20When Stuck
- Re-read the challenge description — titles and flavor text are hints
- Try the challenge from a different category's perspective
- Check for known CVEs in the tech stack
- Search CTFtime writeups for similar challenges
- Look for off-by-one errors in your analysis
- Try all common encodings (base64, hex, rot13, URL)
Challenge
$ARGUMENTS