npx claudepluginhub mysterionrise/ctf-kitThis skill uses the workspace's default tool permissions.
Gather open source intelligence for OSINT challenges.
Suggests manual /compact at logical task boundaries in long Claude Code sessions and multi-phase tasks to avoid arbitrary auto-compaction losses.
Share bugs, ideas, or general feedback.
Gather open source intelligence for OSINT challenges.
Use this command for challenges involving:
First check tool availability: bash scripts/check-tools.sh
For username enumeration (outputs structured JSON):
bash scripts/run-sherlock.sh <username>
JSON output includes:
profiles[]: all found profiles with site and URLsocial_media[]: social media profiles specificallycode_platforms[]: GitHub, GitLab, etc.suggestions: cross-referencing guidanceFor image geolocation (outputs structured JSON):
bash scripts/run-exiftool.sh <image>
JSON output includes:
gps_data: GPS coordinates if presentinteresting_fields[]: CTF-relevant metadata (comments, author, etc.)has_flag: true if flag pattern found in metadataFor domain reconnaissance:
theHarvester -d target.com -b all
dig target.com ANY
whois target.com
Online resources:
run-sherlock.sh username → check JSON for profilesrun-exiftool.sh image.jpg → check JSON for GPS, metadata cluesWhen using /ctf-kit:team-solve with an OSINT challenge, the lead spawns 3 specialists.
All OSINT teammates require plan approval before querying external services.
| Role | Teammate Name | Focus | Tools | First Action |
|---|---|---|---|---|
| People & Social | social-investigator | Username enumeration, social media profiling, identity correlation, breach data | sherlock, scripts/run-sherlock.sh | Run sherlock on any usernames, cross-reference profiles across platforms |
| Domain & Infrastructure | domain-analyst | WHOIS, DNS records, subdomain enumeration, email harvesting, IP geolocation, certificate transparency | whois, dig, theHarvester | Run whois + dig on domains, check certificate transparency logs |
| Geolocation & Media | geo-analyst | EXIF GPS extraction, reverse image search, visual landmark identification, Street View correlation | exiftool, scripts/run-exiftool.sh | Extract EXIF GPS, identify visual landmarks, cross-reference with maps |
Before any teammate queries an external service:
/ctf-kit:osint image.jpg
/ctf-kit:osint challenge.txt