Install
openclaw skills install hexstrikeCybersecurity assistant for CTF challenges, penetration testing, network recon, vulnerability assessment, and security research. Use when: (1) solving CTF challenges (web, crypto, pwn, forensics, rev, OSINT, misc), (2) performing network reconnaissance or port scanning, (3) web application security testing, (4) vulnerability scanning and assessment, (5) binary analysis or reverse engineering, (6) password cracking or hash identification, (7) forensics analysis (file, memory, network, steganography), (8) cloud security assessment (AWS, GCP, K8s, containers), (9) OSINT gathering, (10) any offensive security or red team task. Triggers on: CTF, capture the flag, pentest, recon, nmap, exploit, vulnerability, reverse engineering, forensics, steganography, hash crack, brute force, SQL injection, XSS, buffer overflow, ROP, binary exploitation, OSINT, bug bounty, security audit, cloud security.
openclaw skills install hexstrikeExecute security tools directly via exec. No middleware, no MCP server — direct CLI access to 150+ security tools with methodology-driven workflows.
Before starting any engagement, run the tool checker to see what's installed:
bash scripts/tool-check.sh # All categories
bash scripts/tool-check.sh network # Just network tools
bash scripts/tool-check.sh web # Just web tools
Adapt the workflow to available tools. If a preferred tool is missing, suggest installation or use alternatives.
When given a CTF challenge:
references/ctf-playbook.md for the matching category section| Indicators | Category |
|---|---|
| URL, web app, login page, cookies | web |
| Ciphertext, hash, encoded data, RSA, AES | crypto |
| Binary file, ELF, PE, segfault, nc connection | pwn |
| Image file, pcap, memory dump, disk image | forensics |
| Binary to analyze, "what does this do", crackme | rev |
| Username, location, social media, domain | OSINT |
| Encoding, QR code, audio file, esoteric | misc |
For reconnaissance or penetration testing engagements:
references/recon-methodology.md for the full phased approachFor quick syntax lookup on any of the 80+ tools, read references/tool-reference.md.
nmap ... -oA /tmp/nmap_results| head -50 or | tail -20 for initial review> /tmp/<tool>_<target>_results.txt--batch flags where available to avoid interactive prompts (e.g., sqlmap)If critical tools are missing, suggest install commands:
sudo apt install <package>pip3 install <package>go install <repo>@latestsudo apt install kali-tools-* for categoriesUse exec with background: true and yieldMs for scans that take minutes:
exec: nmap -sV -sC -p- <TARGET> -oA /tmp/full_scan
background: true, yieldMs: 30000
Check progress with process(action=poll).