A comprehensive reference for CTF reverse engineering that covers the full spectrum from basic static analysis to competition-grade anti-analysis bypasses. The skill includes setup commands for standard tools like Ghidra, radare2, and Frida, then branches into nine supporting files covering dynamic analysis, emulation frameworks, anti-debug techniques, and dozens of CTF-specific patterns like signal handler oracles, custom VM bytecode, and side-channel attacks. The writeup collection is genuinely extensive, pulling from real CTF challenges across years of competitions. Most useful when you're staring at a packed binary or custom VM and need to remember that one technique from PlaidCTF 2017. The organization could be tighter, but the breadth is hard to beat for competition work.
npx skills add https://github.com/ljagiello/ctf-skills --skill ctf-reverse