npx skills add https://github.com/ljagiello/ctf-skills --skill solve-challenge你是一名熟练的 CTF 选手。你的目标是解决挑战并找到 flag。
file *strings、xxd | head、binwalk、checksecnc)以了解它们期望什么确定主要类别,然后调用匹配的技能。
按文件类型分类:
广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
.pcap、.pcapng、.evtx、.raw、.dd、.E01 -> 取证.elf、.exe、.so、.dll、无扩展名的二进制文件 -> 逆向或 Pwn(检查是否提供远程服务 -- 如果有,很可能是 Pwn).py、.sage、包含数字的 .txt -> 密码学.apk、.wasm、.pyc -> 逆向按挑战描述关键词分类:
按服务行为分类:
一旦确定类别,调用匹配的技能以获取专业技术:
| 类别 | 调用指令 | 使用时机 |
|---|---|---|
| Web | /ctf-web | XSS、SQLi、SSTI、SSRF、JWT、文件上传、原型污染 |
| Pwn | /ctf-pwn | 缓冲区溢出、格式化字符串、堆利用、ROP、沙箱逃逸 |
| Crypto | /ctf-crypto | RSA、AES、ECC、PRNG、ZKP、古典密码 |
| Reverse | /ctf-reverse | 二进制分析、游戏客户端、虚拟机、混淆代码 |
| Forensics | /ctf-forensics | 磁盘镜像、内存转储、事件日志、隐写术、网络抓包 |
| OSINT | /ctf-osint | 社交媒体、地理位置、DNS、公开记录 |
| Malware | /ctf-malware | 混淆脚本、C2 流量、PE/.NET 分析 |
| Misc | /ctf-misc | Jails、编码、RF/SDR、深奥语言、约束求解 |
你也可以调用 /ctf-<category> 来加载包含详细技术的完整技能说明。
如果你的第一种方法不起作用:
常见的多类别模式:
Flag 因 CTF 而异。常见格式:
flag{...}、FLAG{...}、CTF{...}、TEAM{...}ENO{...}、HTB{...}、picoCTF{...})验证规则(重要):
# 在文件中搜索常见的 flag 模式
grep -rniE '(flag|ctf|eno|htb|pico)\{' .
# 在二进制/内存输出中搜索
strings output.bin | grep -iE '\{.*\}'
# 侦察
file * # 识别文件类型
strings binary | grep -i flag # 快速字符串搜索
xxd binary | head -20 # 十六进制转储头部
binwalk -e firmware.bin # 提取嵌入文件
checksec --file=binary # 检查二进制保护
# 连接
nc host port # 连接到挑战
echo -e "answer1\nanswer2" | nc host port # 脚本化输入
curl -v http://host:port/ # HTTP 侦察
# Python 漏洞利用模板
python3 -c "
from pwn import *
r = remote('host', port)
r.interactive()
"
$ARGUMENTS
每周安装量
561
仓库
GitHub 星标数
629
首次出现
2026年2月1日
安全审计
安装于
codex552
opencode550
github-copilot538
gemini-cli537
amp537
kimi-cli536
You're a skilled CTF player. Your goal is to solve the challenge and find the flag.
file * on everythingstrings, xxd | head, binwalk, checksec on binariesnc) to understand what they expectDetermine the primary category, then invoke the matching skill.
By file type:
.pcap, .pcapng, .evtx, .raw, .dd, .E01 -> forensics.elf, .exe, .so, .dll, binary with no extension -> reverse or pwn (check if remote service provided -- if yes, likely pwn).py, .sage, with numbers -> cryptoBy challenge description keywords:
By service behavior:
Once you identify the category, invoke the matching skill to get specialized techniques:
| Category | Invoke | When to Use |
|---|---|---|
| Web | /ctf-web | XSS, SQLi, SSTI, SSRF, JWT, file uploads, prototype pollution |
| Pwn | /ctf-pwn | Buffer overflow, format string, heap, ROP, sandbox escape |
| Crypto | /ctf-crypto | RSA, AES, ECC, PRNG, ZKP, classical ciphers |
| Reverse | /ctf-reverse | Binary analysis, game clients, VMs, obfuscated code |
| Forensics | /ctf-forensics |
You can also invoke /ctf-<category> to load the full skill instructions with detailed techniques.
If your first approach doesn't work:
Common multi-category patterns:
Flags vary by CTF. Common formats:
flag{...}, FLAG{...}, CTF{...}, TEAM{...}ENO{...}, HTB{...}, picoCTF{...})Validation rule (important):
If you find multiple flag-like strings, treat them as candidates and validate before finalizing.
Prefer the token tied to the intended artifact/workflow (not random metadata noise or obvious decoys).
Do a corpus-wide uniqueness check and include the source file/path when reporting.
grep -rniE '(flag|ctf|eno|htb|pico){' .
strings output.bin | grep -iE '{.*}'
# Recon
file * # Identify file types
strings binary | grep -i flag # Quick string search
xxd binary | head -20 # Hex dump header
binwalk -e firmware.bin # Extract embedded files
checksec --file=binary # Check binary protections
# Connect
nc host port # Connect to challenge
echo -e "answer1\nanswer2" | nc host port # Scripted input
curl -v http://host:port/ # HTTP recon
# Python exploit template
python3 -c "
from pwn import *
r = remote('host', port)
r.interactive()
"
$ARGUMENTS
Weekly Installs
561
Repository
GitHub Stars
629
First Seen
Feb 1, 2026
Security Audits
Gen Agent Trust HubPassSocketWarnSnykWarn
Installed on
codex552
opencode550
github-copilot538
gemini-cli537
amp537
kimi-cli536
多阶段Dockerfile最佳实践指南:构建更小更安全的容器镜像
8,900 周安装
.txt.apk, .wasm, .pyc -> reverse| Disk images, memory dumps, event logs, stego, network captures |
| OSINT | /ctf-osint | Social media, geolocation, DNS, public records |
| Malware | /ctf-malware | Obfuscated scripts, C2 traffic, PE/.NET analysis |
| Misc | /ctf-misc | Jails, encodings, RF/SDR, esoteric languages, constraint solving |