{"skill":{"slug":"ctf-reverse","displayName":"Ctf Reverse","summary":"Provides reverse engineering techniques for CTF challenges. Use when analyzing binaries, game clients, obfuscated code, esoteric languages, custom VMs, anti-...","tags":{"latest":"1.0.0"},"stats":{"comments":0,"downloads":236,"installsAllTime":1,"installsCurrent":1,"stars":0,"versions":1},"createdAt":1774866252448,"updatedAt":1774867908213},"latestVersion":{"version":"1.0.0","createdAt":1774866252448,"changelog":"Initial release of ctf-reverse.\n\n- Provides a comprehensive quick-reference for reverse engineering techniques used in CTF challenges, covering binaries, obfuscated code, custom VMs, anti-debugging, bytecode, game engines, and more.\n- Includes detailed installation instructions for essential tools and Python packages on Linux and macOS.\n- Organizes links to supporting documents for static/dynamic analysis, anti-analysis, binary patterns, language/platform specifics, and hardware-focused RE.\n- Guidance on when to use this skill versus pivoting to other CTF disciplines (pwn, forensics, web, AI/ML, crypto, malware).\n- Designed for use with filesystem-enabled agents with bash, Python 3, and internet access.","license":"MIT-0"},"metadata":null,"owner":{"handle":"gandli","userId":"s17c214vqwcqpk2wczqpbmyngd83xsas","displayName":"gandli","image":"https://avatars.githubusercontent.com/u/85359251?v=4"},"moderation":{"isSuspicious":true,"isMalwareBlocked":false,"verdict":"suspicious","reasonCodes":["suspicious.llm_suspicious"],"summary":"Detected: suspicious.llm_suspicious","engineVersion":"v2.2.0","updatedAt":1774867908213}}