Back to Packs
cybersecurity 36 skills

CTF Solver Pro Pack

A complete system for solving CTF challenges across all major categories (Web, Crypto, Anti-AI, Pwn, etc.) using structured workflows.

#ctf#security#reverse#crypto#anti-ai#web

In this Pack

36 Items
Cybersecurity

prompt-injection-detector

Identify attack surface of a web application for prompt injection

View Skill
Cybersecurity

llm-jailbreak-advocate

Expert skills for bypassing system-level 'STOP', 'DENY', and 'DO NOT' instructions in AI-integrated CTF challenges.

View Skill
Cybersecurity

prompt-injection-payload-crafter

Specialized skill for generating powerful multi-string payloads to break out of delimiters and injected security contexts.

View Skill
Cybersecurity

exploit-validation

Manually validate and refine exploit strategies

View Skill
Cybersecurity

flag-extractor

Systematically find and extract the flag in a CTF challenge

View Skill
Cybersecurity

jailbreak-logic-analyzer

Logic-based analysis for bypassing AI safety filters in a CTF context

View Skill
Cybersecurity

adversarial-perturbation-finder

Detect and analyze adversarial perturbations meant to fool AI models

View Skill
Cybersecurity

llm-logic-bypass-strategy

Structured strategy for bypassing non-linear logic in AI models

View Skill
Cybersecurity

cipher-identifier

Identify and analyze unknown ciphers and encryption algorithms

View Skill
Cybersecurity

encoding-decoder

Systematically decode common encodings

View Skill
Cybersecurity

frequency-analyzer

Perform character and word frequency analysis

View Skill
Cybersecurity

known-plaintext-analyzer

Identify and exploit known plaintexts in a ciphertext

View Skill
Cybersecurity

brute-force-key-offsets

Iteratively brute-force common encryption keys, Caesar rotation offsets, and XOR sliding windows for ciphertext decryption.

View Skill
Cybersecurity

crypto-weakness-detector

Identify and analyze weak cryptographic implementations

View Skill
Cybersecurity

flag-recovery

Systematically recover the flag from a decrypted cryptographic challenge

View Skill
Cybersecurity

file-signature-verifier

Verify and analyze file signatures (magic bytes) to identify true file types and detect tampering

View Skill
Cybersecurity

pcap-traffic-analyzer

Systematically analyze network packet captures (PCAP) for hidden data, credentials, or flags

View Skill
Cybersecurity

steganography-detector

Detect and extract hidden data from images, audio, and files using steganographic analysis

View Skill
Cybersecurity

hex-reversal-decoder

Decode hex strings that have been reversed or use little-endian byte ordering.

View Skill
Cybersecurity

base64-padding-fixer

Automatically repair and decode corrupted or incomplete Base64 strings by calculating missing padding characters.

View Skill
Cybersecurity

cross-xor-analyzer

Perform XOR analysis by comparing two known plaintexts, ciphertexts, or binaries to derive common keys or differences.

View Skill
Cybersecurity

noise-pattern-detector

Analyze decrypted buffers to identify and strip non-flag noise, garbage bytes, and repeating padding patterns.

View Skill
Cybersecurity

domain-footprint-mapper

Systematically map the digital footprint of a target domain for OSINT CTF challenges

View Skill
Cybersecurity

metadata-exif-extractor

Extract and analyze metadata and EXIF data from files to find hidden OSINT clues in CTF challenges

View Skill
Cybersecurity

social-graph-analyzer

Map and analyze social media profiles, relationships, and digital identities for OSINT CTF challenges

View Skill
Cybersecurity

binary-assembler-analyzer

Identify and analyze disassembly and assembly in binary files

View Skill
Cybersecurity

buffer-overflow-detector

Systematically detect and analyze stack/heap buffer overflow vulnerabilities in compiled binaries

View Skill
Cybersecurity

rop-chain-planner

Design and reason through Return-Oriented Programming (ROP) chains for binary exploitation

View Skill
Cybersecurity

shellcode-generator-logic

Design and reason through shellcode payloads for CTF binary exploitation

View Skill
Cybersecurity

string-extractor

Extract and analyze printable strings from a binary

View Skill
Cybersecurity

control-flow-mapper

Map and analyze the control flow of a binary file

View Skill
Cybersecurity

dynamic-binary-analyzer

Analyze binary behavior dynamically during execution

View Skill
Cybersecurity

web-recon-analyzer

Identify and analyze the attack surface of a web application

View Skill
Cybersecurity

input-surface-mapper

Map all input surfaces and data types in a web application

View Skill
Cybersecurity

xss-sql-injection-detector

Detect and analyze XSS and SQL injection vulnerabilities

View Skill
Cybersecurity

auth-bypass-analyzer

Identify and analyze authentication and authorization bypass points

View Skill

Workflow Breakdown

ctf anti ai bypass

  1. 1.prompt-injection-detector
  2. 2.llm-jailbreak-advocate
  3. 3.prompt-injection-payload-crafter
  4. 4.exploit-validation
  5. 5.flag-extractor

ctf anti ai

  1. 1.prompt-injection-detector
  2. 2.jailbreak-logic-analyzer
  3. 3.adversarial-perturbation-finder
  4. 4.llm-logic-bypass-strategy

ctf crypto

  1. 1.cipher-identifier
  2. 2.encoding-decoder
  3. 3.frequency-analyzer
  4. 4.known-plaintext-analyzer
  5. 5.brute-force-key-offsets
  6. 6.crypto-weakness-detector
  7. 7.flag-recovery

ctf forensics

  1. 1.file-signature-verifier
  2. 2.pcap-traffic-analyzer
  3. 3.steganography-detector
  4. 4.encoding-decoder
  5. 5.flag-extractor

ctf multi layer crypto

  1. 1.cipher-identifier
  2. 2.hex-reversal-decoder
  3. 3.base64-padding-fixer
  4. 4.cross-xor-analyzer
  5. 5.noise-pattern-detector
  6. 6.brute-force-key-offsets
  7. 7.flag-recovery

ctf osint

  1. 1.domain-footprint-mapper
  2. 2.metadata-exif-extractor
  3. 3.social-graph-analyzer
  4. 4.flag-extractor

ctf pwn

  1. 1.binary-assembler-analyzer
  2. 2.buffer-overflow-detector
  3. 3.rop-chain-planner
  4. 4.shellcode-generator-logic
  5. 5.flag-extractor

ctf reversing

  1. 1.binary-assembler-analyzer
  2. 2.string-extractor
  3. 3.control-flow-mapper
  4. 4.dynamic-binary-analyzer
  5. 5.flag-extractor

ctf web

  1. 1.web-recon-analyzer
  2. 2.input-surface-mapper
  3. 3.xss-sql-injection-detector
  4. 4.auth-bypass-analyzer
  5. 5.exploit-validation
  6. 6.flag-extractor