npx claudepluginhub mysterionrise/ctf-kitThis skill uses the workspace's default tool permissions.
Analyze and solve forensics challenges.
Suggests manual /compact at logical task boundaries in long Claude Code sessions and multi-phase tasks to avoid arbitrary auto-compaction losses.
Share bugs, ideas, or general feedback.
Analyze and solve forensics challenges.
Use this command for challenges involving:
First check tool availability: bash scripts/check-tools.sh
For quick embedded file detection:
bash scripts/run-binwalk.sh $ARGUMENTS
bash scripts/run-binwalk.sh <file> --extract # also extract
Read the JSON next_steps object to decide what to do:
has_archives: true → extract with binwalk -ehas_executables: true → analyze with strings/disassemblerhas_images: true → check with /ctf-kit:stegoFor full extract-and-analyze pipeline (chains binwalk → file → strings):
bash scripts/extract-and-analyze.sh <file>
This automatically extracts embedded files, identifies their types, searches for flags and secrets, and suggests next skills to use.
For memory dumps:
bash scripts/run-volatility.sh <dump> # system info
bash scripts/run-volatility.sh <dump> windows.pslist # processes
bash scripts/run-volatility.sh <dump> windows.netscan # network
bash scripts/run-volatility.sh <dump> windows.cmdline # commands
The JSON output includes parsed table data and flags suspicious processes.
For network captures:
bash scripts/run-tshark.sh <pcap>
bash scripts/run-tshark.sh <pcap> "http.request" # with filter
The JSON includes protocol detection (has_http, has_dns, has_tls) with specific extraction commands.
The scripts are designed to chain. A typical forensics workflow:
run-binwalk.sh challenge.bin → JSON shows archives insideextract-and-analyze.sh challenge.bin → extracts and analyzes each filesuggestions, follow up with specific toolsAll scripts produce === PARSED RESULTS (JSON) === sections. Key fields:
| Field | Description |
|---|---|
signatures | Embedded file signatures found |
file_types | Types of embedded files |
next_steps | Boolean flags for what was found |
suggestions | Actionable next commands |
When using /ctf-kit:team-solve with a forensics challenge, the lead spawns 3 specialists:
| Role | Teammate Name | Focus | Tools | First Action |
|---|---|---|---|---|
| File & Disk | file-carver | File carving, embedded data extraction, disk image mounting, deleted file recovery, filesystem analysis | binwalk, foremost, scripts/run-binwalk.sh, scripts/extract-and-analyze.sh | Run extract-and-analyze pipeline on all challenge files |
| Memory | memory-analyst | Volatility3 plugins, process trees, registry hives, command history, DLL injection, malware indicators | volatility3, scripts/run-volatility.sh | Run pslist, netscan, cmdline, filescan on memory dump |
| Network | network-analyst | Protocol analysis, stream reconstruction, credential extraction, DNS exfiltration, HTTP object carving | tshark, scripts/run-tshark.sh | Run tshark stats, extract HTTP objects, check DNS queries |
/ctf-kit:forensics memory.raw
/ctf-kit:forensics capture.pcap
/ctf-kit:forensics disk.img