ctf-recon

Community

CTF reconnaissance & enumeration.

Authorramzxy
Version1.0.0
Installs0

System Documentation

What problem does it solve?

Target reconnaissance and enumeration for CTF challenges can be time-consuming and error-prone. This Skill provides ready-to-run commands and patterns to quickly identify open ports, services, web directories, and technology stacks.

Core Features & Use Cases

  • Network reconnaissance: port scanning, service fingerprinting, and banner grabbing.
  • Web reconnaissance: directory discovery, robots.txt, sitemap.xml, and technology fingerprinting.
  • API and GraphQL discovery: identify common endpoints, docs patterns, and versioning.
  • Use case: when facing a new CTF target, run this Skill to map the attack surface and plan next steps.

Quick Start

Follow the steps below to start reconnaissance on a target:

  1. Scan for ports and services: nmap -sV -T4 target
  2. Enumerate web content and tech: curl -sI http://target/; gobuster dir -u http://target/ -w wordlist.txt
  3. Check APIs and endpoints: for p in api api/v1 api/v2; do curl -s -o /dev/null -w "%{http_code}" "http://target/$p"; done

Dependency Matrix

Required Modules

None required

Components

Standard package

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: ctf-recon
Download link: https://github.com/ramzxy/CTF/archive/main.zip#ctf-recon

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.