ctf-crypto

Community

Identify and break weak crypto in binaries.

Authorcyberkaida
Version1.0.0
Installs0

System Documentation

What problem does it solve?

This Skill helps identify, analyze, and exploit cryptographic implementations in binaries to recover flags, keys, or decrypt data for CTF challenges.

Core Features & Use Cases

  • Crypto presence and algorithm detection: Detects whether cryptography is used and identifies potential algorithms (e.g., RC4, AES, RSA) through strings, imports, and pattern analysis.
  • Implementation analysis and key extraction: Traces data and key material sources, analyzes key schedules and data flows, and documents weaknesses that enable flag recovery.
  • Guided exploitation workflow: Provides a structured workflow from discovery to exploitation, including renaming variables, mapping memory, and reproducing logic for verification.
  • Use Case: Given a binary with a hardcoded key and a simple XOR-based cipher, locate the key and decrypt the embedded payload.

Quick Start

Start by uploading the target binary and instruct the AI to locate any hardcoded keys, analyze the crypto routine, and attempt to decrypt the embedded data.

Dependency Matrix

Required Modules

None required

Components

Standard package

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: ctf-crypto
Download link: https://github.com/cyberkaida/reverse-engineering-assistant/archive/main.zip#ctf-crypto

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.