AI SummaryA binary exploitation analysis booster that automates reconnaissance and vulnerability detection for CTF challenges, helping security researchers and students quickly identify exploitation vectors in compiled binaries.
Install
Copy this and paste it into Claude Code, Cursor, or any AI assistant:
I want to install the "cctf" skill in my project. Please run this command in my terminal: # Install skill into the correct directory (9 files) mkdir -p .claude/skills/commands && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/SKILL.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/pwn.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/crypto.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/crypto.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/ctftime.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/ctftime.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/forensics.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/forensics.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/misc.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/misc.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/rev.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/rev.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/solve.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/solve.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/web.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/web.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/writeup.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/writeup.md" Then restart Claude Code (or reload the window in Cursor) so the skill is picked up.
Description
Binary exploitation analysis
Context
Target: $ARGUMENTS Binary info: !file $ARGUMENTS 2>/dev/null Security: !checksec --file=$ARGUMENTS 2>/dev/null Dangerous functions: !objdump -d $ARGUMENTS 2>/dev/null | grep -E "gets|strcpy|sprintf|scanf|system" | head -10
Task
Spawn pwn-expert agent using binary-analysis skill to: • Analyze binary protections • Find vulnerability (BOF/format string/heap) • Develop exploit with pwntools • Capture flag Flag format: varies by platform (e.g., flag{...}, picoCTF{...}, HTB{...})
Discussion
Health Signals
My Fox Den
Community Rating
Sign in to rate this booster