tag

ctf

10 indexed skills · max 10 per page

skills (10)

ctf-crypto

ljagiello/ctf-skills · Productivity

0

Cryptographic attack techniques and exploits for CTF challenges across classical, modern, and advanced schemes. \n \n Covers 50+ attack vectors including RSA (Wiener, Pollard, Coppersmith, padding oracles), ECC (small subgroup, Smart's attack, ECDSA nonce reuse), AES (ECB leakage, CBC padding oracle, CFB-8), and stream ciphers (LFSR, Berlekamp-Massey) \n Includes PRNG attacks (MT19937 state recovery from floats via GF(2) matrix, V8 Math.random prediction, C srand synchronization via ctypes) and

ctf-web

ljagiello/ctf-skills · Productivity

0

Web exploitation techniques for CTF challenges covering injection, authentication, access control, and client-side attacks. \n \n Covers 20+ attack categories: SQLi, XSS, SSTI, SSRF, XXE, command injection, path traversal, JWT/OAuth/SAML, prototype pollution, deserialization, file upload RCE, and race conditions \n Includes quick-reference payloads, filter bypasses, and multi-stage exploitation chains with real CTF examples (HTB, Pragyan, Nullcon) \n Supporting markdown files detail server-side

ctf-rev

cyberkaida/reverse-engineering-assistant · Productivity

0

You are a CTF reverse engineering solver. Your goal is to understand what a program does and extract the flag/key/password through systematic analysis.

ctf-pwn

cyberkaida/reverse-engineering-assistant · Productivity

0

You are a CTF binary exploitation specialist. Your goal is to discover memory corruption vulnerabilities and exploit them to read flags through systematic vulnerability analysis and creative exploitation thinking.

ctf-malware

ljagiello/ctf-skills · Productivity

0

Malware analysis and network traffic techniques for CTF challenges. \n \n Covers script deobfuscation (JavaScript, PowerShell, base64/hex decoding), YARA rule writing, shellcode analysis with Unicorn Engine and Capstone, and memory forensics using Volatility 3 (malfind, process injection detection) \n Includes PE and .NET binary analysis (peframe, dnSpy, AsmResolver), malware configuration extraction, and sandbox evasion detection (VM detection, timing checks, API hashing) \n Provides C2 traffic

ctf-misc

ljagiello/ctf-skills · Productivity

0

Miscellaneous CTF techniques covering encoding, signal processing, sandbox escape, and system exploitation. \n \n Covers 20+ technique categories including Python/Bash jail escape, RF/SDR signal processing, DNS exploitation, Unicode steganography, QR codes, Z3 constraint solving, and WASM patching \n Includes quick-reference commands for common encodings (Base64, Base32, Hex, ROT13), IEEE-754 float data hiding, and cipher identification workflows \n Provides Linux privilege escalation techniques

ctf-osint

ljagiello/ctf-skills · Productivity

0

Open source intelligence techniques for CTF challenges using public data sources. \n \n Covers social media OSINT (Twitter/X user tracking, Tumblr investigation, BlueSky API, Discord), username enumeration across 741+ platforms, and Unicode homoglyph steganography detection \n Includes geolocation methods: reverse image search, Street View panorama matching, road sign OCR, MGRS/Plus Code conversion, and infrastructure mapping via OpenRailwayMap \n Provides web reconnaissance: Google dorking with

ctf-pwn

ljagiello/ctf-skills · Productivity

0

Comprehensive binary exploitation reference covering stack overflows, ROP chains, heap attacks, kernel pwn, and advanced CTF techniques. \n \n Covers 50+ exploitation techniques including buffer overflows, format strings, ROP/ret2libc, heap vulnerabilities (House of Orange/Spirit/Lore, tcache stashing unlink), UAF, race conditions, and seccomp bypass \n Includes kernel exploitation (modprobe_path, tty_struct kROP, userfaultfd, KASLR/KPTI bypass, SLUB heap spray) and Windows SEH overwrite with Vi

ctf-forensics

ljagiello/ctf-skills · Productivity

0

Comprehensive digital forensics and signal analysis toolkit for CTF challenges across disk, memory, network, and steganography domains. \n \n Covers 15+ forensics categories: disk/memory imaging (Volatility, VM forensics, coredumps), Windows registry/event logs/SAM, Linux logs/Docker, network analysis (PCAP, TLS decryption, SMB, NTLMv2), and browser artifact extraction \n Includes advanced steganography techniques: image LSB/bitplane extraction, PDF multi-layer stego, audio DTMF/FFT/SSTV, SVG ke

ctf-reverse

ljagiello/ctf-skills · Productivity

0

Reverse engineering techniques and tool reference for CTF binary analysis challenges. \n \n Covers 15+ binary types: x86-64, ARM, RISC-V, Python bytecode, WASM, .NET, APK (including Flutter/Dart AOT via Blutter), HarmonyOS HAP/ABC, custom VMs, and packed executables \n Includes dynamic analysis shortcuts (strings, ltrace, strace, memory dumping) and static patterns for XOR ciphers, anti-debugging, self-modifying code, signal-based exploration, and multi-stage loaders \n Provides tool-specific co