·ctf-malware
!

ctf-malware

ljagiello/ctf-skills

Malware and network analysis techniques for CTF challenges. Use when analyzing obfuscated scripts, malicious packages, custom protocols, or C2 traffic.

15Installs·1Trend·@ljagiello

Installation

$npx skills add https://github.com/ljagiello/ctf-skills --skill ctf-malware

SKILL.md

Look for C2 communication patterns on unusual ports (e.g., port 21 not for FTP).

Pattern (Stomaker): Malware uses Telegram bot to exfiltrate stolen data.

Pattern (Tampered Seal): Malware uses WSS over non-standard port with RC4 encryption.

Malware and network analysis techniques for CTF challenges. Use when analyzing obfuscated scripts, malicious packages, custom protocols, or C2 traffic. Source: ljagiello/ctf-skills.

View raw

Facts (cite-ready)

Stable fields and commands for AI/search citations.

Install command
npx skills add https://github.com/ljagiello/ctf-skills --skill ctf-malware
Category
!Security
Verified
First Seen
2026-02-06
Updated
2026-02-18

Quick answers

What is ctf-malware?

Malware and network analysis techniques for CTF challenges. Use when analyzing obfuscated scripts, malicious packages, custom protocols, or C2 traffic. Source: ljagiello/ctf-skills.

How do I install ctf-malware?

Open your terminal or command line tool (Terminal, iTerm, Windows Terminal, etc.) Copy and run this command: npx skills add https://github.com/ljagiello/ctf-skills --skill ctf-malware Once installed, the skill will be automatically configured in your AI coding environment and ready to use in Claude Code or Cursor

Where is the source repository?

https://github.com/ljagiello/ctf-skills

Details

Category
!Security
Source
skills.sh
First Seen
2026-02-06