Skip to content
Skill

cctf

by kiwamizamurai

AI Summary

A binary exploitation analysis booster that automates reconnaissance and vulnerability detection for CTF challenges, helping security researchers and students quickly identify exploitation vectors in compiled binaries.

Install

Copy this and paste it into Claude Code, Cursor, or any AI assistant:

I want to install the "cctf" skill in my project.

Please run this command in my terminal:
# Install skill into the correct directory (9 files)
mkdir -p .claude/skills/commands && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/SKILL.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/pwn.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/crypto.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/crypto.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/ctftime.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/ctftime.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/forensics.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/forensics.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/misc.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/misc.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/rev.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/rev.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/solve.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/solve.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/web.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/web.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/writeup.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/writeup.md"

Then restart Claude Code (or reload the window in Cursor) so the skill is picked up.

Description

Binary exploitation analysis

Context

Target: $ARGUMENTS Binary info: !file $ARGUMENTS 2>/dev/null Security: !checksec --file=$ARGUMENTS 2>/dev/null Dangerous functions: !objdump -d $ARGUMENTS 2>/dev/null | grep -E "gets|strcpy|sprintf|scanf|system" | head -10

Task

Spawn pwn-expert agent using binary-analysis skill to: • Analyze binary protections • Find vulnerability (BOF/format string/heap) • Develop exploit with pwntools • Capture flag Flag format: varies by platform (e.g., flag{...}, picoCTF{...}, HTB{...})

Discussion

0/2000
Loading comments...

Health Signals

MaintenanceCommitted 3mo ago
Stale
AdoptionUnder 100 stars
5 ★ · Niche
DocsMissing or thin
Undocumented

GitHub Signals

Stars5
Forks1
Issues0
Updated3mo ago
View on GitHub
No License

My Fox Den

Community Rating

Sign in to rate this booster

Works With

Claude Code