ctf-reverse
CommunityMaster RE tactics for CTF challenges.
Education & Research#debugging#ctf#forensics#obfuscation#reverse-engineering#binary-analysis#vm-analysis
Authorljagiello
Version1.0.0
Installs0
System Documentation
What problem does it solve?
CTF reverse engineering challenges often require a structured approach to analyze binaries, obfuscated code, and esoteric runtimes to retrieve hidden flags and understand protection mechanisms.
Core Features & Use Cases
- Thorough problem framing and static/dynamic analysis workflows for binary, VM, and packer challenges.
- Guidance on decryption, anti-debug bypass, memory forensics, and pattern recognition to identify flag logic.
- Use Case: When faced with a custom VM or obfuscated binary, follow the workflow to map instructions, trace data flows, and extract the flag securely.
Quick Start
Identify a sample challenge, then apply the workflow to locate the entry point, extract strings, and begin dynamic tracing.
Dependency Matrix
Required Modules
None requiredComponents
Standard package💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: ctf-reverse Download link: https://github.com/ljagiello/ctf-skills/archive/main.zip#ctf-reverse Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.