ctf-crypto
CommunityIdentify and break weak crypto in binaries.
Authorcyberkaida
Version1.0.0
Installs0
System Documentation
What problem does it solve?
This Skill helps identify, analyze, and exploit cryptographic implementations in binaries to recover flags, keys, or decrypt data for CTF challenges.
Core Features & Use Cases
- Crypto presence and algorithm detection: Detects whether cryptography is used and identifies potential algorithms (e.g., RC4, AES, RSA) through strings, imports, and pattern analysis.
- Implementation analysis and key extraction: Traces data and key material sources, analyzes key schedules and data flows, and documents weaknesses that enable flag recovery.
- Guided exploitation workflow: Provides a structured workflow from discovery to exploitation, including renaming variables, mapping memory, and reproducing logic for verification.
- Use Case: Given a binary with a hardcoded key and a simple XOR-based cipher, locate the key and decrypt the embedded payload.
Quick Start
Start by uploading the target binary and instruct the AI to locate any hardcoded keys, analyze the crypto routine, and attempt to decrypt the embedded data.
Dependency Matrix
Required Modules
None requiredComponents
Standard package💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: ctf-crypto Download link: https://github.com/cyberkaida/reverse-engineering-assistant/archive/main.zip#ctf-crypto Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.