npx claudepluginhub mysterionrise/ctf-kitThis skill uses the workspace's default tool permissions.
Analyze and solve cryptography challenges.
Suggests manual /compact at logical task boundaries in long Claude Code sessions and multi-phase tasks to avoid arbitrary auto-compaction losses.
Share bugs, ideas, or general feedback.
Analyze and solve cryptography challenges.
Use this command for challenges involving:
First check tool availability: bash scripts/check-tools.sh
Run the crypto analysis:
ctf run crypto $ARGUMENTS
For hash identification (outputs structured JSON with cracking commands):
bash scripts/identify-hash.sh <hash-string>
bash scripts/identify-hash.sh hashes.txt
The JSON output includes:
hashes[].types[]: identified hash types with confidencehashes[].types[].hashcat_mode: exact hashcat -m numberhashes[].types[].jtr_format: exact john --format valuesuggestions: ready-to-run cracking commandsFor XOR analysis (outputs structured JSON with key candidates):
bash scripts/run-xortool.sh <encrypted-file>
bash scripts/run-xortool.sh <file> 8 # known key length
bash scripts/run-xortool.sh <file> 8 20 # key length + most frequent char (space=0x20)
The JSON output includes:
key_lengths[]: candidates with probability percentagesbest_key_length: most probable key lengthkey_found: actual key if detecteddecrypted_files: paths to decrypted candidatesBased on JSON findings, chain to next tool:
xortool-xor -n -s '<key>' <file>RsaCtfTool -n <n> -e <e> --uncipher <c>| Pattern | Likely Type |
|---|---|
| 32 hex chars | MD5 hash |
| 40 hex chars | SHA1 hash |
| 64 hex chars | SHA256 hash |
== at end | Base64 |
| All caps + 2-7 | Base32 |
| n=..., e=... | RSA parameters |
All scripts produce a === PARSED RESULTS (JSON) === section. Use the suggestions array for ready-to-run next commands.
When using /ctf-kit:team-solve with a crypto challenge, the lead spawns 3 specialists:
| Role | Teammate Name | Focus | Tools | First Action |
|---|---|---|---|---|
| Classical & Encoding | classical-analyst | Frequency analysis, substitution ciphers, Vigenere, transposition, encoding chains (Base64/hex/ROT13) | CyberChef, scripts/run-decode.sh, scripts/identify-hash.sh, dcode.fr | Run decode + hash-id on all files, check for known cipher patterns |
| Asymmetric & Math | rsa-specialist | RSA factoring (small primes, Fermat, Wiener), padding oracles, Boneh-Durfee, ECC, Diffie-Hellman | RsaCtfTool, openssl, sage, python3 | Extract RSA parameters (n,e,c), try RsaCtfTool, check factordb |
| Symmetric & Hash | symmetric-cracker | XOR key recovery, AES mode attacks (ECB/CBC), hash cracking, HMAC | xortool, hashcat, john, scripts/run-xortool.sh | Run xortool on binary files, identify and crack any hashes |
/ctf-kit:crypto cipher.txt
/ctf-kit:crypto encrypted.bin
/ctf-kit:crypto ./challenge/