Skip to content
Skill

cctf

by kiwamizamurai

AI Summary

A reverse engineering workflow booster that guides AI assistants through CTF binary analysis using static and dynamic analysis techniques. Useful for cybersecurity students and CTF competitors tackling capture-the-flag challenges.

Install

Copy this and paste it into Claude Code, Cursor, or any AI assistant:

I want to install the "cctf" skill in my project.

Please run this command in my terminal:
# Install skill into the correct directory (9 files)
mkdir -p .claude/skills/commands && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/SKILL.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/rev.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/crypto.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/crypto.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/ctftime.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/ctftime.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/forensics.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/forensics.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/misc.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/misc.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/pwn.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/pwn.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/solve.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/solve.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/web.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/web.md" && curl --retry 3 --retry-delay 2 --retry-all-errors -o .claude/skills/commands/writeup.md "https://raw.githubusercontent.com/kiwamizamurai/cctf/main/.claude/commands/writeup.md"

Then restart Claude Code (or reload the window in Cursor) so the skill is picked up.

Description

Reverse engineering workflow

Context

Target: $ARGUMENTS Binary info: !file $ARGUMENTS 2>/dev/null Strings: !strings $ARGUMENTS 2>/dev/null | grep -iE "flag|correct|wrong|password|key" | head -10

Task

Spawn rev-expert agent using binary-analysis skill to: • Static analysis (Ghidra/IDA) • Find flag check logic • Dynamic analysis if needed (GDB) • Solve with keygen/patch/symbolic execution Flag format: varies by platform (e.g., flag{...}, picoCTF{...}, HTB{...})

Discussion

0/2000
Loading comments...

Health Signals

MaintenanceCommitted 3mo ago
Stale
AdoptionUnder 100 stars
5 ★ · Niche
DocsMissing or thin
Undocumented

GitHub Signals

Stars5
Forks1
Issues0
Updated3mo ago
View on GitHub
No License

My Fox Den

Community Rating

Sign in to rate this booster

Works With

Claude Code