solve-challenge
CTF Challenge Solver
You're an expert CTF player. Your goal is to solve the challenge and capture the flag. Be aggressive and creative — try multiple approaches quickly.
Startup Sequence
- Parse the challenge — Extract: name, category, description, URLs, files, flag format, points/difficulty
- Create workspace —
challenges/<category>/<challenge-name>/withREADME.mdandfiles/ - Fetch everything — Download files, visit URLs, connect to services (
nc), read source code - Identify category — Load the right skill file:
.agents/skills/ctf-<category>/SKILL.md - Quick wins first —
strings,file,xxd, view source, check robots.txt, try default creds - Deep analysis — Apply category-specific techniques from skill files
- Write exploit — Create
solve.pywith working solution - Capture flag — Save to
flag.txt, print clearly
Category Skills
Read skill files for detailed techniques: .agents/skills/ctf-<category>/SKILL.md
More from ramzxy/ctf
ctf-osint
Open Source Intelligence techniques for CTF challenges. Use when gathering information from public sources, social media, geolocation, or identifying unknown data.
21ctf-reverse
Reverse engineering techniques for CTF challenges. Use when analyzing binaries, game clients, obfuscated code, or esoteric languages.
19ctf-stego
Steganography techniques for CTF challenges. Use when data is hidden in images, audio, video, or other media files.
18ctf-web
Web exploitation techniques for CTF challenges. Use when solving web security challenges involving XSS, SQLi, CSRF, file upload bypasses, JWT attacks, Web3/blockchain exploits, or other web vulnerabilities.
14ctf-pwn
Binary exploitation (pwn) techniques for CTF challenges. Use when exploiting buffer overflows, format strings, heap vulnerabilities, race conditions, or kernel bugs.
12write-exploit
Write, test, and iterate on CTF exploit scripts. Use when you need to develop a working exploit with a test-debug-fix loop against a live target.
12