ctf-malware
✓Malware and network analysis techniques for CTF challenges. Use when analyzing obfuscated scripts, malicious packages, custom protocols, or C2 traffic.
Installation
SKILL.md
Look for C2 communication patterns on unusual ports (e.g., port 21 not for FTP).
Pattern (Stomaker): Malware uses Telegram bot to exfiltrate stolen data.
Pattern (Tampered Seal): Malware uses WSS over non-standard port with RC4 encryption.
Malware and network analysis techniques for CTF challenges. Use when analyzing obfuscated scripts, malicious packages, custom protocols, or C2 traffic. Source: ljagiello/ctf-skills.
Facts (cite-ready)
Stable fields and commands for AI/search citations.
- Install command
npx skills add https://github.com/ljagiello/ctf-skills --skill ctf-malware- Source
- ljagiello/ctf-skills
- Category
- !Security
- Verified
- ✓
- First Seen
- 2026-02-06
- Updated
- 2026-02-18
Quick answers
What is ctf-malware?
Malware and network analysis techniques for CTF challenges. Use when analyzing obfuscated scripts, malicious packages, custom protocols, or C2 traffic. Source: ljagiello/ctf-skills.
How do I install ctf-malware?
Open your terminal or command line tool (Terminal, iTerm, Windows Terminal, etc.) Copy and run this command: npx skills add https://github.com/ljagiello/ctf-skills --skill ctf-malware Once installed, the skill will be automatically configured in your AI coding environment and ready to use in Claude Code or Cursor
Where is the source repository?
https://github.com/ljagiello/ctf-skills
Details
- Category
- !Security
- Source
- skills.sh
- First Seen
- 2026-02-06