openclaw 网盘下载
OpenClaw

技能详情(站内镜像,无评论)

首页 > 技能库 > CTF Writeup Generator

Automatically generate professional CTF writeups from solving sessions with flag detection, challenge categorization, and proper markdown formatting

媒体与内容

作者:AM @akhmittra

许可证:MIT-0

MIT-0 ·免费使用、修改和重新分发。无需归因。

版本:v1.0.0

统计:⭐ 0 · 1.1k · 3 current installs · 3 all-time installs

0

安装量(当前) 3

🛡 VirusTotal :良性 · OpenClaw :良性

Package:akhmittra/ctf-writeup-generator

安全扫描(ClawHub)

  • VirusTotal :良性
  • OpenClaw :良性

OpenClaw 评估

The skill's requirements, instructions, and scope are coherent with its stated purpose of generating CTF writeups; it requests no credentials, has no install steps, and contains only instructions relevant to producing formatted markdown writeups.

目的

Name/description match the SKILL.md instructions: the skill generates CTF writeups, detects flags, categorizes challenges, formats markdown, and suggests platform-specific templates. No unrelated credentials, binaries, or config paths are requested.

说明范围

Instructions remain within the writeup generation domain (gather challenge metadata, parse user notes, validate flag formats, produce/safe a markdown file). One notable point: the instructions produce exploit steps, commands, and privilege-escalation descriptions — this is consistent with CTF writeups but is dual-use content (allowed by purpose). The skill also saves files to disk (writes markdown files), which is expected but worth noting.

安装机制

No install spec or code is included (instruction-only). No downloads or archive extraction occur.

证书

Requires no environment variables, credentials, or config paths. The declared and actual surface area match.

持久

The skill does not set always:true. It also does not set disableModelInvocation:true, so the agent could invoke it autonomously when eligible — this is common for utility skills but worth awareness if you want strict user-trigger-only behavior.

综合结论

This skill appears coherent and does what it says: create professionally formatted CTF writeups from user-provided notes. Before installing, consider: (1) CTF writeups commonly include exploit commands and privilege-escalation steps — treat this as dual-use content and avoid pasting real production credentials or sensitive target data into the skill. (2) The skill will save markdown files to the agent workspace; ensure you are comfortable with…

安装(复制给龙虾 AI)

将下方整段复制到龙虾中文库对话中,由龙虾按 SKILL.md 完成安装。

请把本段交给龙虾中文库(龙虾 AI)执行:为本机安装 OpenClaw 技能「CTF Writeup Generator」。简介:Automatically generate professional CTF writeups from solving sessions with fla…。
请 fetch 以下地址读取 SKILL.md 并按文档完成安装:https://raw.githubusercontent.com/openclaw/skills/refs/heads/main/skills/akhmittra/ctf-writeup-generator/SKILL.md
(来源:yingzhi8.cn 技能库)

SKILL.md

打开原始 SKILL.md(GitHub raw)

---
name: ctf-writeup-generator
description: Automatically generate professional CTF writeups from solving sessions with flag detection, challenge categorization, and proper markdown formatting
tags:
  - cybersecurity
  - ctf
  - documentation
  - pentesting
  - writeups
homepage: https://github.com/yourusername/ctf-writeup-generator
---

# CTF Writeup Generator

## Description

This skill helps CTF players, security researchers, and cybersecurity educators automatically generate professional writeups from their solving sessions. It intelligently detects flag formats, categorizes challenges, structures the writeup with proper headings, and includes code blocks with syntax highlighting.

Perfect for:
- Creating platform-specific writeups (HackTheBox, TryHackMe, OffSec, etc.)
- Documenting Jeopardy-style CTF solutions
- Generating educational content for training materials
- Building a portfolio of security research

## When to Use

Use this skill when the user:
- Says "generate a CTF writeup"
- Mentions "document my CTF solution"
- Asks to "create a writeup for [challenge name]"
- References completing a CTF challenge and needs documentation
- Wants to format their solving process professionally
- Needs to extract and format flags from their notes

## Features

### Flag Format Detection
Automatically detects and validates common CTF flag formats:
- `CTF{...}`, `FLAG{...}`, `flag{...}`
- Platform-specific: `HTB{...}`, `THM{...}`, `SHAASTRA{...}`, `picoCTF{...}`
- Custom regex patterns for competition-specific formats
- Case-sensitive validation support

### Challenge Categories
Automatically categorizes based on keywords and tools used:
- **Web Exploitation**: SQL injection, XSS, CSRF, authentication bypass
- **Binary Exploitation**: Buffer overflow, ROP, format strings, heap exploitation
- **Reverse Engineering**: Binary analysis, decompilation, obfuscation
- **Cryptography**: Classical ciphers, modern crypto, hash cracking
- **Forensics**: Steganography, memory forensics, network analysis, disk imaging
- **OSINT**: Information gathering, social media analysis
- **PWN**: Exploitation, shellcode, privilege escalation
- **Miscellaneous**: Mixed or unique challenge types

### Structured Output
Generates properly formatted markdown writeups with:
- Challenge metadata (name, category, difficulty, points)
- Executive summary
- Reconnaissance findings
- Step-by-step solution with code blocks
- Tools used section
- Flag submission
- Key learnings and takeaways
- Optional: Additional resources and references

### Code Formatting
Proper syntax highlighting for:
- Python, Bash, JavaScript, C/C++
- Assembly (x86, ARM)
- SQL queries
- Command-line tools output
- Network packet analysis

## Instructions

When a user requests a CTF writeup, follow this workflow:

1. **Gather Information**
   Ask the user for:
   - Challenge name
   - Platform/CTF name (e.g., "HackTheBox", "Shaastra CTF")
   - Category (or detect from description)
   - Difficulty level (Easy/Medium/Hard or points value)
   - Flag format if non-standard
   - Their solving process/notes

2. **Process the Content**
   - Extract technical steps from their description
   - Identify tools and commands used
   - Detect flag format and validate
   - Categorize the challenge
   - Structure the flow logically

3. **Generate the Writeup**
   Create a markdown document with this structure:

   ```markdown
   # [Challenge Name] - [Platform] CTF Writeup
   
   **Author**: [Author name or handle]  
   **Date**: [Current date]  
   **Category**: [Category]  
   **Difficulty**: [Difficulty]  
   **Points**: [Points if applicable]
   
   ## Summary
   
   [2-3 sentence overview of the challenge and solution approach]
   
   ## Challenge Description
   
   [Original challenge description if provided]
   
   ## Reconnaissance
   
   [Initial enumeration and information gathering]
   
   ## Solution
   
   ### Step 1: [Phase name]
   
   [Detailed explanation with commands/code]
   
   ```bash
   # Commands used
   ```
   
   ### Step 2: [Next phase]
   
   [Continue with logical progression]
   
   ## Tools Used
   
   - Tool 1: Purpose
   - Tool 2: Purpose
   
   ## Flag
   
   ```
   FLAG{...}
   ```
   
   ## Key Takeaways
   
   - Learning point 1
   - Learning point 2
   
   ## References
   
   - [Relevant links]
   ```

4. **Validate and Enhance**
   - Check flag format matches the platform
   - Ensure code blocks have proper syntax highlighting
   - Add explanatory comments to complex commands
   - Include alternative approaches if mentioned

5. **Save the Writeup**
   Save the generated writeup to a markdown file named:
   `[platform]_[challenge-name]_writeup.md`

## Example Usage

**User**: "I just solved the 'Binary Bash' challenge from Shaastra CTF. It was a buffer overflow where I had to overwrite the return address. The flag was Shaastra{buff3r_0v3rfl0w_m4st3r}. Can you generate a writeup?"

**Agent Response**:
1. Asks for additional details (tools used, exact exploit steps)
2. Generates a professional writeup with:
   - Proper challenge metadata
   - Binary exploitation category
   - Step-by-step buffer overflow explanation
   - Code blocks with assembly/C code
   - GDB commands used
   - Flag in correct format
   - Learning points about memory safety

## Platform-Specific Templates

### HackTheBox
- Include machine IP, OS, and difficulty rating
- Add user/root flag sections
- Include attack path diagram if complex

### OffSec/OSCP
- Focus on enumeration methodology
- Document privilege escalation chains
- Include proof screenshots references

### Jeopardy CTF
- List point values and solve times
- Include team strategy if relevant
- Categorize by challenge type

## Advanced Features

### Multi-Tool Integration
- Reference other skills for specific tasks:
  - `ghidra-skill` for reverse engineering analysis
  - `burpsuite-skill` for web exploitation
  - `volatility-skill` for memory forensics

### Writeup Templates
Support for different writeup styles:
- **Academic**: Detailed with theoretical background
- **Speedrun**: Concise with just essential steps
- **Tutorial**: Beginner-friendly with extra explanations
- **Portfolio**: Professional format for job applications

### Export Formats
- Standard Markdown (.md)
- PDF via pandoc
- HTML with custom CSS
- Platform-specific formats (HTB Academy, Medium, dev.to)

## Security Considerations

- Never include actual credentials or sensitive API keys
- Sanitize paths that might reveal system information
- Respect competition rules (don't publish during active CTF)
- Add spoiler warnings for recent challenges
- Verify flag sharing is allowed by platform

## Configuration

Users can customize via environment variables:

```bash
# Set default author name
export CTF_AUTHOR="akm626"

# Set default CTF platform
export CTF_PLATFORM="HackTheBox"

# Set preferred writeup style
export CTF_WRITEUP_STYLE="tutorial"

# Enable automatic screenshot embedding
export CTF_AUTO_SCREENSHOTS=true
```

## Dependencies

- Basic markdown processor (built-in)
- Optional: pandoc (for PDF export)
- Optional: pygments (for enhanced syntax highlighting)

## Tips for Best Results

1. Provide detailed solving notes - the more context, the better
2. Include command outputs when relevant
3. Mention dead-ends and why they failed (valuable learning)
4. Reference CVEs and tool documentation
5. Add your unique insights and methodology
6. Keep flag formats consistent with the platform

## Example Writeup Structure

For a web exploitation challenge:

```markdown
# SQL Injection Master - Shaastra CTF 2026

**Author**: akm626  
**Date**: February 08, 2026  
**Category**: Web Exploitation  
**Difficulty**: Medium  
**Points**: 300

## Summary

This challenge involved exploiting a SQL injection vulnerability in a login form to extract database contents and retrieve the flag. The application used client-side filtering which was easily bypassed.

## Challenge Description

[Original description...]

## Reconnaissance

Initial enumeration revealed a PHP-based login portal running on Apache. Basic directory fuzzing found:

```bash
ffuf -w common.txt -u http://target.com/FUZZ

admin/
backup/
config/
```

## Solution

### Step 1: Identifying the Injection Point

Testing the login form with basic SQL injection payloads:

```sql
' OR '1'='1' --
admin' --
' UNION SELECT NULL--
```

### Step 2: Database Enumeration

Used SQLMap to automate extraction:

```bash
sqlmap -u "http://target.com/login.php" --data="username=admin&password=test" 
       --technique=U --dump --batch
```

[Continue with detailed steps...]

## Flag

```
SHAASTRA{sql_inj3ct10n_pr0}
```

## Key Takeaways

- Always test for SQL injection on input fields
- Client-side validation is not security
- Parameterized queries prevent SQL injection

## Tools Used

- **Burp Suite**: Request interception
- **SQLMap**: Automated SQL injection
- **ffuf**: Directory fuzzing

## References

- [OWASP SQL Injection Guide](https://owasp.org/...)
- [SQLMap Documentation](https://sqlmap.org/)
```

## Contributing

Users can improve this skill by:
- Adding new flag format patterns
- Contributing platform-specific templates
- Enhancing categorization logic
- Sharing example writeups

## License

MIT License - Free to use and modify

## Support

For issues or suggestions, contact the skill maintainer or file an issue on the GitHub repository.