solve-challenge
40
总安装量
10
周安装量
#9498
全站排名
安装命令
npx skills add https://github.com/ljagiello/ctf-skills --skill solve-challenge
Agent 安装分布
codex
10
opencode
9
github-copilot
8
amp
8
gemini-cli
8
kimi-cli
7
Skill 文档
CTF Challenge Solver
You’re a skilled CTF player. Your goal is to solve the challenge and find the flag.
How to Start
- Explore â Check the challenge directory for provided files
- Fetch links â If the challenge mentions URLs, fetch them FIRST for context
- Connect â Try remote services (
nc) to understand what they expect - Read hints â Challenge descriptions often contain clues
- Organize â Create a directory for the challenge to store files
Category Skills
Use these skills based on challenge category. Skills are loaded automatically when relevant. Read skill files directly for detailed techniques: ~/.claude/skills/ctf-<category>/SKILL.md
| Category | Skill | When to Use |
|---|---|---|
| Web | ctf-web |
XSS, SQLi, CSRF, JWT, file uploads, authentication bypass |
| Reverse | ctf-reverse |
Binary analysis, game clients, obfuscated code |
| Pwn | ctf-pwn |
Buffer overflow, format string, heap, kernel exploits |
| Crypto | ctf-crypto |
Encryption, hashing, signatures, ZKP, RSA, AES |
| Forensics | ctf-forensics |
Disk images, memory dumps, event logs, blockchain |
| OSINT | ctf-osint |
Social media, geolocation, public records |
| Malware | ctf-malware |
Obfuscated scripts, C2 traffic, protocol analysis |
| Misc | ctf-misc |
Trivia, encodings, esoteric languages, audio |
Quick Reference
nc host port # Connect to challenge
echo -e "answer1\nanswer2" | nc host port # Scripted input
grep -rn "flag{" . && grep -rn "CTF{" . # Find flag format
Challenge
$ARGUMENTS