Agentic AI Atlasby a5c.ai
OverviewWikiGraphFor AgentsEdgesSearchWorkspace
/
GitHubDocsDiscord
i.5Wiki
Agentic AI Atlas · ljagiello/ctf-skills
docs/reference-repos/ljagiello/ctf-skills/researcha5c.ai
Search the atlas/
Wiki · linked records

Article and nearby pages

I.Current articlepp. 1 - 1
I.
Wiki article

docs/reference-repos/ljagiello/ctf-skills/research

Reading · 3 min

ljagiello/ctf-skills reference

Graph-backed Atlas wiki page.

Page nodewiki/docs/reference-repos/ljagiello/ctf-skills/research.mdNearby pages · 0Documents · 0

ljagiello/ctf-skills

Metadata

  • **Stars**: 1,332
  • **Description**: Agent skills for solving CTF challenges - web exploitation, binary pwn, crypto, reverse engineering, forensics, OSINT, and more
  • **License**: MIT
  • **Last pushed**: 2026-04-10 (very active)
  • **Topics**: agent-skills, claude-code, claude-code-skills, codex, codex-cli, ctf, gemini, gemini-cli, opencode, security
  • **Fork**: No

Classification

  • **Archetype**: mega-skill-pack
  • **Domain**: Security / CTF challenges

Structure

- ctf-web/ (16 files) -- SQL injection, XSS, SSTI, SSRF, JWT, prototype pollution, etc. - ctf-pwn/ (15 files) -- buffer overflow, ROP, heap exploitation, kernel exploitation - ctf-crypto/ (13 files) -- RSA, AES, ECC, PRNG, lattice attacks - ctf-reverse/ (14 files) -- binary analysis, custom VMs, WASM, anti-debug, Frida - ctf-forensics/ (13 files) -- disk/memory forensics, steganography, network captures - ctf-osint/ (3 files) -- geolocation, social media, DNS recon - ctf-malware/ (3 files) -- obfuscated scripts, C2 traffic, PE analysis - ctf-misc/ (11 files) -- pyjails, encodings, RF/SDR, Docker escape - ctf-writeup/ -- writeup generation

  • 9 category directories, each with SKILL.md + reference files:
  • solve-challenge/ -- orchestrator skill that delegates to category skills
  • scripts/install_ctf_tools.sh -- tool installer
  • tests/ -- test infrastructure
  • Install via: npx skills add ljagiello/ctf-skills

Key Observations

  • Extraordinarily comprehensive security knowledge base
  • Each category SKILL.md is a massive reference document with techniques, tools, and patterns
  • The solve-challenge orchestrator is a process-like pattern: analyze challenge -> classify -> delegate to specialist
  • Multi-harness support (Claude Code, Codex, Gemini, OpenCode)
  • The sheer depth of ctf-web (covering hundreds of specific attack patterns) is remarkable
  • MIT license -- permissive for reuse

Extractable Value

Processes

- Challenge analysis and classification - Tool setup verification - Category-specific solving strategies - Writeup generation - Maps well to babysitter's task/breakpoint model (human approval at exploit steps)

- Systematic web vulnerability scanning using the ctf-web knowledge - Covers: SQLi, XSS, SSTI, SSRF, JWT, prototype pollution, deserialization - Breakpoints for exploitation confirmation

- Reverse engineering pipeline - Anti-debug/anti-VM detection and bypass - Symbolic execution integration (angr, Triton)

  • **CTF challenge solving orchestration** -- placement: specializations/security/ctf-solver.js
  • **Security audit workflow** -- placement: specializations/security/web-security-audit.js
  • **Binary analysis workflow** -- placement: specializations/security/binary-analysis.js

Plugin Ideas

- install.md: run scripts/install_ctf_tools.sh, configure tool paths - Skills: challenge solver orchestration, per-category solving skills - Reference knowledge bundled as compressed context

- Web application security testing - Binary analysis toolchain integration - Forensics toolkit

  • **ctf-toolkit plugin** -- babysitter marketplace plugin
  • **security-audit plugin** -- more general-purpose

Library Mapping

Extractable ProcessLibrary StatusActionExisting PathTarget Placement
CTF Challenge Solving OrchestrationNEWChallenge analysis, classification, delegation to specialists, and writeup generation-specializations/security-compliance/ctf-challenge-solving.js
Web Security Audit WorkflowNEWSystematic web vulnerability scanning with SQLi, XSS, SSTI, SSRF coverage-specializations/security-compliance/web-security-audit.js
Binary Analysis WorkflowNEWReverse engineering pipeline with anti-debug detection and symbolic execution-specializations/security-compliance/binary-analysis.js
Forensics Investigation ProcessNEWDisk/memory forensics, steganography, and network capture analysis workflow-specializations/security-compliance/forensics-investigation.js
Cryptographic Attack MethodologyNEWRSA, AES, ECC attack patterns with lattice and PRNG analysis-specializations/security-compliance/cryptographic-attack-methodology.js
OSINT Investigation ProcessNEWGeolocation, social media, and DNS reconnaissance methodology-specializations/security-compliance/osint-investigation.js

Plugin Marketplace Mapping

Plugin IdeaMarketplace StatusActionExisting PluginTarget Placement
CTF Security ToolkitNEWComprehensive CTF toolchain with challenge solving orchestration-plugins/a5c/marketplace/plugins/ctf-security-toolkit/
Binary Analysis SuiteUPGRADEEnhanced binary analysis with reverse engineering and symbolic execution toolsbasic-securityplugins/a5c/marketplace/plugins/binary-analysis-suite/

SKIP

  • Individual technique encyclopedias (these are reference knowledge, not processes)
  • Tool installation scripts (environment setup, not orchestration)

Trail

Wiki
Babysitter Docs
Reference Repos

Ljagiello

Ctf Skills

ljagiello/ctf-skills

Page record

Open node ledger

wiki/docs/reference-repos/ljagiello/ctf-skills/research.md

Documents

No documented graph nodes on this page.