
from CTF Skills Collection1,622
Reference of cryptographic attack techniques and tools for CTF challenges (RSA, AES, ECC, lattices, PRNGs, padding oracles, and more).
Provides a comprehensive quick-reference of cryptanalysis techniques and practical tooling for CTF-style cryptography challenges. It collects one-line technique summaries and links to detailed supporting files (RSA attacks, lattice workflows, stream/modern/legacy cipher guides, PRNG recovery, ZKP pitfalls) and includes quick-start commands and recommended Python/Sage tools.
Use this skill when you face a CTF crypto problem or any challenge that requires targeted cryptanalysis (factoring, padding oracle exploitation, lattice-based HNP/LWE approaches, PRNG/state recovery, ECC/DSA/ECDSA nonce issues, or ZKP-related attacks). Pivot to reverse, forensics, or pwn skills when the blocker is binary analysis, disk recovery, or exploit development.
Best for filesystem-enabled agents with shell access and Python/Sage support (Claude Code, Codex-style agents, or any agent that can run local scripts and pip/sage).
This skill has not been reviewed by our automated audit pipeline yet.
CTF Write-up Generator
Generate a concise, reproducible submission-style CTF writeup with a one-path solution script, metadata, and a short checklist for fast verification.
CTF Web Exploitation
Comprehensive web-exploitation playbook for CTFs: XSS, SQLi, SSTI, SSRF, XXE, JWT abuse, auth bypass, file upload chains, and web-related reconnaissance.