ctfbase -- bash

$ cat /proc/ctfbase/info

CTF Base

grep your way through 1,600 CTF writeups

Hybrid AI search|MCP for Claude/Cursor|Complete exploits with flags

$ grep -ri

Try:

without-ctfbase

$ google "heap overflow ctf writeup glibc 2.35"

✗ 10 results, 3 are 404

✗ 2 are wrong glibc version

✗ 45 minutes wasted

Competition is over.

with-ctfbase

$ grep "heap overflow glibc 2.35" /writeups/pwn/

✓ 7 results in 0.8 seconds

✓ First result: exact technique

✓ Working exploit code included

Challenge solved.

search

$ ctfbase search "format string"

Hybrid AI Search

Full-text + vector similarity. Finds writeups even across languages. 0.5-1.4s.

Found 23 results in 0.6s

mcp

$ claude "how to exploit this?"

[MCP] searching ctfbase... found 5 matches

MCP Server

Connect Claude, Cursor, or any MCP client. Real solutions, not guesses.

mcp.ctfbase.com/mcp

flag

$ cat /writeups/pwn/heap-uaf/flag.txt

flag{r34l_fl4g5_fr0m_c0mp3t1t10n5}

Real Solutions

Complete writeups with flags, exploit code, and step-by-step from real CTFs.

stats

$ cat /proc/ctfbase/stats

writeups0
tags0
techniques0
tools0
categories0
search_avg0.8s

Your AI assistant just got CTF superpowers

Connect CTF Base to Claude, Cursor, or any MCP-compatible client

before-mcp

You:"How do I exploit a format string vulnerability?"

AI: *gives generic textbook answer*

after-mcp

You:"How do I exploit a format string vulnerability?"

[MCP] searched CTF Base, 23 writeups found

"Based on real writeups from PicoCTF 2024, here's a working approach..."

setup

Connect in 30 seconds:

$ claude mcp add ctfbase https://mcp.ctfbase.com/mcp

updates.feed

Follow new writeups in Telegram

Get newly published writeups, short summaries, and direct links in @ctfbase_updates.

$join @ctfbase_updates