3 boosters for "capture-the-flag" — open source, verified from GitHub, ready to install
A binary exploitation analysis booster that automates reconnaissance and vulnerability detection for CTF challenges, helping security researchers and students quickly identify exploitation vectors in compiled binaries.
A web vulnerability assessment skill for CTF challenges that automates reconnaissance and exploit development against target URLs. Useful for security practitioners and CTF competitors looking to systematically identify and exploit web vulnerabilities.
A reverse engineering workflow booster that guides AI assistants through CTF binary analysis using static and dynamic analysis techniques. Useful for cybersecurity students and CTF competitors tackling capture-the-flag challenges.