Install
openclaw skills install zipcrackerCTF-oriented ZIP cracking and recovery with the bundled ZipCracker engine. Use when Codex or OpenClaw needs to analyze or recover an encrypted ZIP in authori...
openclaw skills install zipcrackerUse this skill as a self-contained ZIP cracking package. Always prefer the bundled wrapper in scripts/openclaw_zipcracker.py over assuming the original repository still exists somewhere else.
Only use it for CTF, self-owned archives, or authorized security work. If the request sounds like unauthorized access to third-party data, refuse.
rar or 7z.python3 <skill-dir>/scripts/openclaw_zipcracker.py --profile <zip>
Use the profile mode to surface pseudo-encryption, AES vs ZipCrypto mix, short-plaintext candidates, template KPA candidates, and recommended next commands.
python3 <skill-dir>/scripts/openclaw_zipcracker.py <zip> ...
--auto-crc for short-plaintext CRC32 prompts.--auto-template-kpa to let the bundled engine follow up on template-KPA suggestions automatically.--auto-large-mask only when the user explicitly accepts a very large mask search.--skip-dict-count for huge wordlists.--skip-orig-password-recovery when the user only cares about extraction speed after a bkcrack-based recovery.--allow-install-prompts only when the user explicitly wants interactive dependency installation attempts.When the user only says "crack this ZIP" or "analyze this archive", inspect first, then begin with the default flow:
python3 <skill-dir>/scripts/openclaw_zipcracker.py --profile <zip>
Then:
python3 <skill-dir>/scripts/openclaw_zipcracker.py --auto-template-kpa <zip>
This preserves the original ZipCracker mindset:
pyzipper.Add --auto-crc only when short-plaintext recovery is likely relevant or when the user explicitly asks to try CRC32-style recovery.
python3 <skill-dir>/scripts/openclaw_zipcracker.py <zip> <dict-or-dir>
python3 <skill-dir>/scripts/openclaw_zipcracker.py <zip> -m '?u?l?l?l?d?d'
-kpa:python3 <skill-dir>/scripts/openclaw_zipcracker.py <zip> -kpa <plain-file-or-zip>
python3 <skill-dir>/scripts/openclaw_zipcracker.py <zip> -kpa <part.bin> --kpa-offset 78 -x 0 4d5a
python3 <skill-dir>/scripts/openclaw_zipcracker.py <zip> --kpa-template png -c image.png
bkcrack recovery and does not want fallback methods:python3 <skill-dir>/scripts/openclaw_zipcracker.py <zip> -kpa <plain-file> --bkcrack
bkcrack usually beats blind dictionary work when at least some bytes are reliable.png, zip, exe, or pcapng.Do not jump directly into brute force when the request is vague. The bundled engine already attempts pseudo-encryption repair by clearing the encryption bit and validating extraction. Keep that behavior because many CTF ZIP tasks are fake-encrypted rather than truly protected.
Use CRC32 recovery only for entries whose plaintext size is 1 to 6 bytes. This is not a generic password attack; it is a content recovery trick for tiny stored plaintexts. In OpenClaw, opt in with --auto-crc when the challenge obviously contains tiny files or the user asks to try CRC-based recovery.
When using -kpa, the engine reproduces the original matching strategy:
-c <inner-name> explicitly.Treat partial KPA as high-value only when the hints are meaningful. The original tool prints a warning when the known bytes are weak. In practice:
-x byte fragments when you know fixed values like MZ, PE, or chunk markers.The bundled engine carries the original built-in templates:
pngzipexepcapngThese are strongest when:
ZIP_STORED, or at least size-compatible with a known header pattern.If the user says "run the full default workflow", include --auto-template-kpa so OpenClaw does not stall at the follow-up prompt.
--skip-dict-count for very large wordlists to avoid expensive upfront line counting.--auto-large-mask only after the user explicitly accepts the cost of a huge mask search.password_list.txt then 1-6 digit numeric passwords.pyzipper is available, but it is slower.bkcrack is the preferred path for full or partial KPA on ZipCrypto.bkcrack, partial/template KPA should be explained as unavailable rather than pretending it was tried.--profile before cracking when the user has not already provided a strong clue.scripts/openclaw_zipcracker.py as the command entrypoint.--skip-orig-password-recovery after successful bkcrack extraction.python3 <skill-dir>/scripts/openclaw_zipcracker.py --profile <zip>
python3 <skill-dir>/scripts/openclaw_zipcracker.py --auto-template-kpa <zip>
python3 <skill-dir>/scripts/openclaw_zipcracker.py --skip-dict-count <zip> <huge-dict.txt>
python3 <skill-dir>/scripts/openclaw_zipcracker.py <zip> -m '?l?l?l?l?d?d'
python3 <skill-dir>/scripts/openclaw_zipcracker.py <zip> -kpa <plain.zip>
python3 <skill-dir>/scripts/openclaw_zipcracker.py <zip> -kpa <part.bin> --kpa-offset 78 -x 0 4d5a -x 128 50450000
python3 <skill-dir>/scripts/openclaw_zipcracker.py --auto-template-kpa <zip> --kpa-template exe -c app.exe
references/clawhub-final-submission.md when you need the final recommended Chinese and English storefront copy, tags, and default prompt for direct submission.references/clawhub-publishing-copy.md when you need polished listing copy, tags, and a prompt pack for ClawHub.references/clawhub-bilingual-copy.md when you need Chinese and English storefront copy with stronger marketing positioning.references/competitive-ctf-prompts.md when you want a sharper, more player-like default prompt or demo prompt.references/natural-language-command-examples.md when the user request is vague but contains clues that should map to a specific command.references/forward-test-report.md for the latest local pressure-test findings and wording adjustments.references/release-checklist.md before publishing or updating the skill on ClawHub.references/openclaw-workflow.md for the preflight-to-execution flow optimized for OpenClaw.references/attack-playbook.md for concrete user-intent-to-command mappings.references/ctf-techniques.md for the full reproduction of the tool's solving logic, clue prioritization, and troubleshooting heuristics.