ctf-reverse
Reverse engineering techniques and tool reference for CTF binary analysis challenges.
SkillJury keeps community verdicts, source metadata, and external repository signals in separate lanes so ranking data never pretends to be a review.
No approved reviews yet
Waiting on enough review volume
Weekly or total install activity from catalog data
npx skills add https://github.com/ljagiello/ctf-skills --skill ctf-reverse
As of Apr 30, 2026, ctf-reverse has 3 weekly installs, 0 community reviews on SkillJury. Community votes currently stand at 0 upvotes and 0 downvotes. Source: ljagiello/ctf-skills. Canonical URL: https://skills.sh/ljagiello/ctf-skills/ctf-reverse.
Source description provided by the upstream listing. Community review signal and install context stay separate from this narrative layer.
Latest reviews
No community reviews yet. Be the first to review.
What does ctf-reverse do?
Reverse engineering techniques and tool reference for CTF binary analysis challenges.
Is ctf-reverse good?
ctf-reverse does not have approved reviews yet, so SkillJury cannot publish a community verdict.
Which AI agents support ctf-reverse?
ctf-reverse currently lists compatibility with Skills CLI.
Is ctf-reverse safe to install?
ctf-reverse has been scanned by security audit providers tracked on SkillJury. Check the security audits section on this page for detailed results from Socket.dev and Snyk.
What are alternatives to ctf-reverse?
Skills in the same category include grimoire-morpho-blue, conversation-memory, second-brain-ingest, zai-tts.
How do I install ctf-reverse?
Run the following command to install ctf-reverse: npx skills add https://github.com/ljagiello/ctf-skills --skill ctf-reverse
More from ljagiello/ctf-skills
ctf-crypto
Cryptographic attack techniques and exploits for CTF challenges across classical, modern, and advanced schemes.
ctf-forensics
Comprehensive digital forensics and signal analysis toolkit for CTF challenges across disk, memory, network, and steganography domains.
ctf-malware
Malware analysis and network traffic techniques for CTF challenges.
ctf-misc
Miscellaneous CTF techniques covering encoding, signal processing, sandbox escape, and system exploitation.
Alternatives in Software Engineering
grimoire-morpho-blue
Query Morpho Blue deployment metadata and vault snapshots via the Grimoire CLI.
conversation-memory
Persistent memory systems for LLM conversations with tiered storage and intelligent retrieval.
second-brain-ingest
Process raw source documents into structured, interlinked wiki pages.
zai-tts
High-quality text-to-speech audio generation using GLM-TTS with customizable voices and playback parameters.