npx claudepluginhub mysterionrise/ctf-kitThis skill uses the workspace's default tool permissions.
Analyze and solve steganography challenges.
Suggests manual /compact at logical task boundaries in long Claude Code sessions and multi-phase tasks to avoid arbitrary auto-compaction losses.
Share bugs, ideas, or general feedback.
Analyze and solve steganography challenges.
Use this command for challenges involving:
First check tool availability: bash scripts/check-tools.sh
Recommended: Run the full stego pipeline for comprehensive analysis:
bash scripts/stego-pipeline.sh $ARGUMENTS
The pipeline automatically:
The JSON output combines all results with a unified suggestions array.
For individual tools:
PNG/BMP (LSB analysis):
bash scripts/run-zsteg.sh image.png
JSON findings[] shows hidden text/files per channel. Use zsteg -E <channel> to extract.
JPEG (steghide):
bash scripts/run-steghide.sh image.jpg
bash scripts/run-steghide.sh image.jpg "mypassword"
JSON shows extracted_file and password_used on success.
Metadata:
bash scripts/run-exiftool.sh image.png
JSON interesting_fields[] highlights CTF-relevant metadata with reasons.
The pipeline handles chaining automatically. For manual chaining:
run-exiftool.sh image.png → check JSON interesting_fields for cluesrun-zsteg.sh image.png → check JSON findings for LSB datazsteg -E <channel> image.png > extracted/ctf-kit:analyze| File Type | First Try |
|---|---|
| PNG/BMP | stego-pipeline.sh (runs zsteg + exiftool + binwalk) |
| JPEG | stego-pipeline.sh (runs steghide + exiftool + binwalk) |
| GIF | Check frames, delays |
| WAV | Spectrogram in Audacity |
| Any | stego-pipeline.sh covers metadata + embedded data |
All scripts produce === PARSED RESULTS (JSON) === or === PIPELINE RESULTS (JSON) === sections. The has_flag field is true when a flag pattern is detected.
When using /ctf-kit:team-solve with a stego challenge, the lead spawns 3 specialists:
| Role | Teammate Name | Focus | Tools | First Action |
|---|---|---|---|---|
| Image Analyst | image-analyst | LSB analysis across channels (RGB, alpha), steghide extraction with password lists, visual plane separation, pixel manipulation | zsteg, steghide, stegsolve, scripts/run-zsteg.sh, scripts/run-steghide.sh | Run zsteg (PNG/BMP) or steghide (JPEG) with common passwords |
| Metadata & Structure | metadata-analyst | EXIF/XMP metadata, file structure anomalies, appended data after EOF, IHDR manipulation, chunk analysis | exiftool, binwalk, xxd, scripts/run-exiftool.sh, scripts/run-binwalk.sh | Run exiftool for hidden comments/GPS, binwalk for appended files |
| Audio & Advanced | audio-analyst | Spectrogram messages, audio LSB encoding, DTMF tone decoding, video frame extraction, multi-layer stego | Audacity (CLI), sox, ffmpeg | Generate spectrogram, check audio LSB, extract video frames |
/ctf-kit:stego image.png
/ctf-kit:stego audio.wav
/ctf-kit:stego ./media/