npx claudepluginhub mysterionrise/ctf-kitThis skill uses the workspace's default tool permissions.
Analyze challenge files to determine type and suggest approaches.
Suggests manual /compact at logical task boundaries in long Claude Code sessions and multi-phase tasks to avoid arbitrary auto-compaction losses.
Share bugs, ideas, or general feedback.
Analyze challenge files to determine type and suggest approaches.
Use this command when you have new challenge files and need to:
First check tool availability: bash scripts/check-tools.sh
Recommended: Run the full triage pipeline for automatic category detection:
bash scripts/triage.sh $ARGUMENTS
The triage script chains: file → strings → binwalk → exiftool, then outputs a JSON summary including:
category: detected challenge type (crypto, forensics, stego, etc.)confidence: detection confidence (0-100%)suggested_skill: which /ctf-kit:* command to use nextfindings: flags, URLs, hashes, base64 strings foundembedded_signatures: files hidden inside the challenge fileFor strings-only analysis with pattern detection:
bash scripts/run-strings.sh $ARGUMENTS
Or run the CLI analysis:
ctf analyze $ARGUMENTS
Read the JSON output at the end of each script. It contains structured data you can use to decide next steps. The suggestions field tells you exactly what to do next.
Based on the triage results, use the recommended skill:
/ctf-kit:crypto for cryptography challenges/ctf-kit:forensics for forensics challenges/ctf-kit:stego for steganography challenges/ctf-kit:web for web security challenges/ctf-kit:pwn for binary exploitation challenges/ctf-kit:reverse for reverse engineering challenges/ctf-kit:osint for OSINT challenges/ctf-kit:misc for miscellaneous challengesAll scripts produce a === PARSED RESULTS (JSON) === section with structured data. Key fields:
| Field | Description |
|---|---|
category | Detected challenge category |
confidence | Detection confidence (0.0-1.0) |
suggested_skill | Which skill to invoke next |
findings.flags | Any flags found in strings |
suggestions | Actionable next steps |
/ctf-kit:analyze challenge.bin
/ctf-kit:analyze ./challenge-folder/
/ctf-kit:crypto - Crypto-specific analysis/ctf-kit:forensics - Forensics analysis/ctf-kit:stego - Steganography analysis