npx claudepluginhub mysterionrise/ctf-kitThis skill uses the workspace's default tool permissions.
Analyze and solve web security challenges.
Suggests manual /compact at logical task boundaries in long Claude Code sessions and multi-phase tasks to avoid arbitrary auto-compaction losses.
Share bugs, ideas, or general feedback.
Analyze and solve web security challenges.
Use this command for challenges involving:
First check tool availability: bash scripts/check-tools.sh
For directory/file enumeration (outputs structured JSON):
bash scripts/run-gobuster.sh http://target.com
bash scripts/run-gobuster.sh http://target.com /path/to/wordlist.txt
bash scripts/run-gobuster.sh http://target.com /path/to/wordlist.txt php,html,txt
JSON output includes:
accessible: paths returning 200 (with size)redirects: paths returning 3xxforbidden: paths returning 403 (may indicate hidden content)suggestions: which paths to investigateFor SQL injection:
sqlmap -u "http://target.com/page?id=1" --dbs
sqlmap -u "http://target.com/page?id=1" -D database -T table --dump
Manual testing checklist:
| Vulnerability | Test Payload |
|---|---|
| SQL Injection | ' OR '1'='1 |
| XSS | <script>alert(1)</script> |
| Path Traversal | ../../../etc/passwd |
| SSTI | {{7*7}} or ${7*7} |
| Command Injection | ; id or | id |
When using /ctf-kit:team-solve with a web challenge, the lead spawns 3 specialists.
All web teammates require plan approval before sending requests to the target.
| Role | Teammate Name | Focus | Tools | First Action |
|---|---|---|---|---|
| Recon & Enumeration | web-recon | Directory scanning, technology fingerprinting, hidden paths, backup files, robots.txt, source code review | gobuster, ffuf, scripts/run-gobuster.sh, curl | Check robots.txt, run gobuster, view page source, identify tech stack |
| Injection | injection-tester | SQLi, XSS, SSTI, command injection, path traversal, SSRF, deserialization | sqlmap, manual payloads, curl | Map input fields, test with common payloads from the patterns table above |
| Auth & Logic | auth-analyst | JWT manipulation, session handling, IDOR, privilege escalation, business logic flaws, API abuse | jwt_tool, curl, burp | Inspect cookies/tokens, test auth bypass, enumerate API endpoints |
Before any teammate sends a request to the target:
/ctf-kit:web ./webapp-source/
/ctf-kit:web http://challenge.ctf.com