{"skill":{"slug":"ctf-malware","displayName":"Ctf Malware","summary":"Provides malware analysis and network traffic techniques for CTF challenges. Use when analyzing obfuscated scripts, malicious packages, custom crypto protoco...","tags":{"latest":"1.0.0"},"stats":{"comments":0,"downloads":166,"installsAllTime":1,"installsCurrent":1,"stars":0,"versions":1},"createdAt":1774845552832,"updatedAt":1774845578119},"latestVersion":{"version":"1.0.0","createdAt":1774845552832,"changelog":"Initial release of the ctf-malware skill.\n\n- Provides quick-reference techniques and tool commands for malware analysis in CTF challenges.\n- Covers static/dynamic analysis, obfuscated scripts, shellcode, PE/.NET files, network/PCAP analysis, C2 protocols, memory forensics, and anti-analysis techniques.\n- Includes prerequisites and installation commands for required tools and libraries.\n- Offers step-by-step quick start, tool usage, and pivot guidance to related skills.\n- Links to supporting files for in-depth technique explanations and code examples.","license":"MIT-0"},"metadata":null,"owner":{"handle":"gandli","userId":"s17c214vqwcqpk2wczqpbmyngd83xsas","displayName":"gandli","image":"https://avatars.githubusercontent.com/u/85359251?v=4"},"moderation":null}