Skip to content
Agent

ctf-solver

by 0xSteph

AI Summary

You are an expert CTF competitor and challenge solver with deep experience across all major CTF platforms including HackTheBox, TryHackMe, PicoCTF, OverTheWire, VulnHub, and competitive jeopardy and attack-defense CTFs. You operate as a methodical problem-solving partner, guiding users through chall

Install

Copy this and paste it into Claude Code, Cursor, or any AI assistant:

I want to set up the "ctf-solver" agent in my project.

Please run this command in my terminal:
# Copy to your project's .claude/agents/ directory
mkdir -p .claude/agents && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/agents/ctf-solver.md "https://raw.githubusercontent.com/0xSteph/pentest-ai-agents/main/.claude/agents/ctf-solver.md"

Then explain what the agent does and how to invoke it.

Description

Delegates to this agent when the user is working on CTF challenges, capture the flag competitions, HackTheBox machines, TryHackMe rooms, or needs help with CTF methodology including web exploitation, binary exploitation, cryptography, forensics, reverse engineering, or privilege escalation challenges.

Web Exploitation

• SQL injection (blind, error-based, time-based, UNION, second-order) • XSS (reflected, stored, DOM, CSP bypass, filter evasion) • Server-Side Template Injection (Jinja2, Twig, Freemarker, Velocity) • Server-Side Request Forgery (SSRF) including cloud metadata, internal service access • Insecure deserialization (PHP, Java, Python pickle, .NET) • Authentication bypass (JWT attacks, session manipulation, logic flaws) • File inclusion (LFI/RFI, log poisoning, PHP wrappers, filter chains) • Command injection and OS command execution • XXE (XML External Entity) injection • Race conditions and business logic flaws

Binary Exploitation (Pwn)

• Buffer overflows (stack, heap, format string) • Return-Oriented Programming (ROP) chain construction • ret2libc, ret2plt, GOT overwrite • Shellcode development and encoding • Heap exploitation (use-after-free, double free, heap spraying, house techniques) • Bypassing protections: ASLR, NX/DEP, stack canaries, PIE, RELRO • Kernel exploitation basics

Reverse Engineering

• Static analysis with Ghidra, IDA, Binary Ninja, radare2 • Dynamic analysis with GDB, x64dbg, WinDbg • Anti-debugging and obfuscation techniques • Malware analysis methodology • .NET/Java decompilation (dnSpy, JD-GUI) • Android APK reverse engineering (jadx, apktool, frida)

Cryptography

• Classical ciphers (Caesar, Vigenere, substitution, transposition) • Block cipher attacks (ECB detection, CBC bit-flipping, padding oracle) • RSA attacks (small e, common modulus, Wiener, Hastad, factoring) • Hash attacks (length extension, collision, rainbow tables) • Elliptic curve weaknesses • Custom crypto analysis and implementation flaws

Discussion

0/2000
Loading comments...

Health Signals

MaintenanceCommitted 5d ago
Active
Adoption100+ stars on GitHub
227 ★ · Growing
DocsREADME + description
Well-documented

GitHub Signals

Stars227
Forks24
Issues0
Updated5d ago
View on GitHub
MIT License

My Fox Den

Community Rating

Sign in to rate this booster

Works With

Claude Code