ctf-web

Installation
Summary

Web exploitation techniques for CTF challenges covering injection, authentication, access control, and client-side attacks.

  • Covers 20+ attack categories: SQLi, XSS, SSTI, SSRF, XXE, command injection, path traversal, JWT/OAuth/SAML, prototype pollution, deserialization, file upload RCE, and race conditions
  • Includes quick-reference payloads, filter bypasses, and multi-stage exploitation chains with real CTF examples (HTB, Pragyan, Nullcon)
  • Supporting markdown files detail server-side attacks (ExifTool, Go rune bypass, Flask debug mode, Docker SSRF chains), client-side techniques (DOM clobbering, XS-Leak, Unicode case folding), and infrastructure auth (CI/CD credential theft, identity provider takeover)
  • Requires filesystem agent with bash, Python 3, and internet access for tool installation (sqlmap, ffuf, hashcat, ysoserial)
SKILL.md

CTF Web Exploitation

Use this skill as a routing and execution guide for web-heavy challenges. Keep the first pass short: map the app, confirm the trust boundary, and only then dive into the detailed technique notes.

Prerequisites

Python packages (all platforms):

pip install sqlmap flask-unsign requests

Linux (apt):

apt install hashcat jq curl

macOS (Homebrew):

brew install hashcat jq curl
Related skills

More from ljagiello/ctf-skills

Installs
3.5K
GitHub Stars
2.0K
First Seen
Feb 1, 2026