AI SummaryA reverse engineering workflow booster that guides AI assistants through CTF binary analysis using static and dynamic analysis techniques. Useful for cybersecurity students and CTF competitors tackling capture-the-flag challenges.
Install
Copy this and paste it into Claude Code, Cursor, or any AI assistant:
I want to install the "cctf" skill in my project. Please run this command in my terminal: # Install skill into the correct directory (9 files) mkdir -p .claude/skills/commands && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/SKILL.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/rev.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/crypto.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/crypto.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/ctftime.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/ctftime.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/forensics.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/forensics.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/misc.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/misc.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/pwn.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/pwn.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/solve.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/solve.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/web.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/web.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/writeup.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/writeup.md" Then restart Claude Code (or reload the window in Cursor) so the skill is picked up.
Description
Reverse engineering workflow
Context
Target: $ARGUMENTS Binary info: !file $ARGUMENTS 2>/dev/null Strings: !strings $ARGUMENTS 2>/dev/null | grep -iE "flag|correct|wrong|password|key" | head -10
Task
Spawn rev-expert agent using binary-analysis skill to: • Static analysis (Ghidra/IDA) • Find flag check logic • Dynamic analysis if needed (GDB) • Solve with keygen/patch/symbolic execution Flag format: varies by platform (e.g., flag{...}, picoCTF{...}, HTB{...})
Discussion
Health Signals
My Fox Den
Community Rating
Sign in to rate this booster