pentest-ctf-forensics

Digital forensics, steganography, and packet analysis for CTF challenges and investigation.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "pentest-ctf-forensics" with this command: npx skills add jd-opensource/joysafeter/jd-opensource-joysafeter-pentest-ctf-forensics

Pentest CTF Forensics

Purpose

Extract hidden information from various artifacts: memory dumps, network captures (PCAP), images, and disk images.

Core Workflow

  1. File Analysis: Identify file type, metadata, and embedded strings using file, exiftool, and strings.
  2. Steganography: Detect and extract hidden data in images/audio using steghide and stegsolve.
  3. Network Forensics: Analyze PCAP files for suspicious traffic and flag transmission using wireshark or tshark.
  4. Memory Forensics: Analyze memory dumps for processes, connections, and injected code using volatility.
  5. Data Extraction: Carve files and recover deleted data using foremost and binwalk.

References

  • references/tools.md
  • references/workflows.md

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

pentest-osint-recon

No summary provided by upstream source.

Repository SourceNeeds Review
General

pentest-mobile-app

No summary provided by upstream source.

Repository SourceNeeds Review
General

pentest-exploit-validation

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

pentest-whitebox-code-review

No summary provided by upstream source.

Repository SourceNeeds Review