ctf▌
10 indexed skills · max 10 per page
ctf-crypto
ljagiello/ctf-skills · Productivity
Cryptographic attack techniques and exploits for CTF challenges across classical, modern, and advanced schemes. \n \n Covers 50+ attack vectors including RSA (Wiener, Pollard, Coppersmith, padding oracles), ECC (small subgroup, Smart's attack, ECDSA nonce reuse), AES (ECB leakage, CBC padding oracle, CFB-8), and stream ciphers (LFSR, Berlekamp-Massey) \n Includes PRNG attacks (MT19937 state recovery from floats via GF(2) matrix, V8 Math.random prediction, C srand synchronization via ctypes) and
ctf-web
ljagiello/ctf-skills · Productivity
Web exploitation techniques for CTF challenges covering injection, authentication, access control, and client-side attacks. \n \n Covers 20+ attack categories: SQLi, XSS, SSTI, SSRF, XXE, command injection, path traversal, JWT/OAuth/SAML, prototype pollution, deserialization, file upload RCE, and race conditions \n Includes quick-reference payloads, filter bypasses, and multi-stage exploitation chains with real CTF examples (HTB, Pragyan, Nullcon) \n Supporting markdown files detail server-side
ctf-rev
cyberkaida/reverse-engineering-assistant · Productivity
You are a CTF reverse engineering solver. Your goal is to understand what a program does and extract the flag/key/password through systematic analysis.
ctf-pwn
cyberkaida/reverse-engineering-assistant · Productivity
You are a CTF binary exploitation specialist. Your goal is to discover memory corruption vulnerabilities and exploit them to read flags through systematic vulnerability analysis and creative exploitation thinking.
ctf-malware
ljagiello/ctf-skills · Productivity
Malware analysis and network traffic techniques for CTF challenges. \n \n Covers script deobfuscation (JavaScript, PowerShell, base64/hex decoding), YARA rule writing, shellcode analysis with Unicorn Engine and Capstone, and memory forensics using Volatility 3 (malfind, process injection detection) \n Includes PE and .NET binary analysis (peframe, dnSpy, AsmResolver), malware configuration extraction, and sandbox evasion detection (VM detection, timing checks, API hashing) \n Provides C2 traffic
ctf-misc
ljagiello/ctf-skills · Productivity
Miscellaneous CTF techniques covering encoding, signal processing, sandbox escape, and system exploitation. \n \n Covers 20+ technique categories including Python/Bash jail escape, RF/SDR signal processing, DNS exploitation, Unicode steganography, QR codes, Z3 constraint solving, and WASM patching \n Includes quick-reference commands for common encodings (Base64, Base32, Hex, ROT13), IEEE-754 float data hiding, and cipher identification workflows \n Provides Linux privilege escalation techniques
ctf-osint
ljagiello/ctf-skills · Productivity
Open source intelligence techniques for CTF challenges using public data sources. \n \n Covers social media OSINT (Twitter/X user tracking, Tumblr investigation, BlueSky API, Discord), username enumeration across 741+ platforms, and Unicode homoglyph steganography detection \n Includes geolocation methods: reverse image search, Street View panorama matching, road sign OCR, MGRS/Plus Code conversion, and infrastructure mapping via OpenRailwayMap \n Provides web reconnaissance: Google dorking with
ctf-pwn
ljagiello/ctf-skills · Productivity
Comprehensive binary exploitation reference covering stack overflows, ROP chains, heap attacks, kernel pwn, and advanced CTF techniques. \n \n Covers 50+ exploitation techniques including buffer overflows, format strings, ROP/ret2libc, heap vulnerabilities (House of Orange/Spirit/Lore, tcache stashing unlink), UAF, race conditions, and seccomp bypass \n Includes kernel exploitation (modprobe_path, tty_struct kROP, userfaultfd, KASLR/KPTI bypass, SLUB heap spray) and Windows SEH overwrite with Vi
ctf-forensics
ljagiello/ctf-skills · Productivity
Comprehensive digital forensics and signal analysis toolkit for CTF challenges across disk, memory, network, and steganography domains. \n \n Covers 15+ forensics categories: disk/memory imaging (Volatility, VM forensics, coredumps), Windows registry/event logs/SAM, Linux logs/Docker, network analysis (PCAP, TLS decryption, SMB, NTLMv2), and browser artifact extraction \n Includes advanced steganography techniques: image LSB/bitplane extraction, PDF multi-layer stego, audio DTMF/FFT/SSTV, SVG ke
ctf-reverse
ljagiello/ctf-skills · Productivity
Reverse engineering techniques and tool reference for CTF binary analysis challenges. \n \n Covers 15+ binary types: x86-64, ARM, RISC-V, Python bytecode, WASM, .NET, APK (including Flutter/Dart AOT via Blutter), HarmonyOS HAP/ABC, custom VMs, and packed executables \n Includes dynamic analysis shortcuts (strings, ltrace, strace, memory dumping) and static patterns for XOR ciphers, anti-debugging, self-modifying code, signal-based exploration, and multi-stage loaders \n Provides tool-specific co