Skip to content

nigel-dev/ncl-toolkit

Repository files navigation

NCL Toolkit

Learn cybersecurity by doing — AI-powered toolkit for National Cyber League (NCL) competitions.

NCL Toolkit is built for learning. Whether you're practicing in the NCL Gymnasium or competing live, it provides two modes: a coach that walks you through challenges step by step, and a commander that solves them at competition speed. Both are backed by 9 specialist AI agents, a Kali Linux VM via MCP, and optional GPU-accelerated hash cracking.

Two Ways to Learn

Coach Mode — You Do the Work

The AI coach tells you what command to run and why. You run it on your Kali VM, paste the output, and the coach explains what it means and what to do next. You build real skills.

/ncl-coach "Analyze this wireless pcap and find the WiFi password"
Step 1: Identify wireless networks in the capture

Why: Before we can crack anything, we need to know what networks are in this pcap
and what encryption they use.

Run this:
  tshark -r pcap3.pcap -Y 'wlan.fc.type_subtype == 0x08' -T fields \
    -e wlan.ssid -e wlan.bssid -e wlan_radio.channel | sort -u

What to look for: SSIDs (network names), BSSIDs (AP MAC addresses), and channels.

Paste your output and I'll walk you through what it means.

At the end of each session, you get a full learning summary — workflow recap, key commands, patterns to remember.

Guide Mode — AI Does the Work, Explains Everything

Add --guide to any command (or just say "walk me through this"). The AI solves the challenge but narrates every step — what tool it picked, why, and how to read the output. A compiled walkthrough comes with the answers.

/ncl-crack --guide 5f4dcc3b5aa765d61d8327deb882cf99

Competition Mode — Full Speed

No flags, no narration. The commander orchestrates specialist agents, chains their results across domains, and compiles a copy-paste answer table.

/ncl-triage "Given a memory dump, find the user's password"

Quick Start

  1. Clone and open:
    git clone https://github.com/nigel-dev/ncl-toolkit.git
    cd ncl-toolkit
    opencode .
  2. Set up Kali VM — see SETUP.md
  3. Run preflight checks:
    /ncl-setup
    
    Verifies Kali VM, tools, GPU cracker, browser, wordlists — produces a PASS/WARN/FAIL readiness report.
  4. Start learning:
    /ncl-coach "your challenge description here"
    

Commands

All commands are prefixed with /ncl-.

Learning & Competition

Command What It Does
/ncl-coach {challenge} Walkthrough mode — you run commands, coach explains step by step
/ncl-triage {desc} Competition mode — categorize, plan workflow, delegate to specialists
/ncl-setup Pre-competition readiness check — verify all systems
/ncl-load-challenge Scrape active CyberSkyline challenge from Brave browser

Category Commands (all support --guide for narrated mode)

Command NCL Category What It Does
/ncl-recon {target} Scanning nmap → service enum → dir bust → vuln scan
/ncl-web {url} Web App Security SQLi, XSS, auth bypass, LFI/RFI, input validation
/ncl-crack {hash} Password Cracking Hash ID → GPU cracker → rules → themed wordlists
/ncl-crypto {data} Cryptography Encoding/cipher ID → decode/decrypt chains
/ncl-forensics {file} Forensics File ID → metadata → strings → binwalk → stego → memory dumps
/ncl-traffic {pcap} Network Traffic Protocol analysis → credential extraction → wireless analysis
/ncl-log {logfile} Log Analysis Format detection → baseline → anomaly → targeted queries
/ncl-osint {query} OSINT Web search → WHOIS → DNS → social recon
/ncl-exploit {target} Enum & Exploitation Service enum → vuln ID → exploit → post-exploitation
/ncl-gpu-crack {hash} Password Cracking Direct GPU offload (RTX 4090) — 100-200x faster

Team Coordination (git-backed)

Command What It Does
/ncl-claim {name} Claim a challenge — adds to tracker, commits + pushes
/ncl-flag {name} {flag} Record captured flag — moves to completed, commits + pushes
/ncl-stuck {name} {notes} Request help — moves to stuck table with blocker notes
/ncl-handoff {name} {notes} Hand off a challenge with context for the next person
/ncl-status Pull latest and display team scoreboard

Architecture

Two top-level agents, nine specialists:

ncl-coach (practice)              ncl-commander (competition)
  │ Coaches user step by step       │ Plans workflows, chains agents
  │ User runs all commands           │ Delegates to specialists via task()
  │ Explains output, teaches         │ Compiles final answer table
  │                                  │
  │ (reads methodology context)      ├── recon-agent
  │                                  ├── web-exploit-agent
  │                                  ├── crack-agent
  │                                  ├── crypto-agent
  │                                  ├── forensics-agent
  │                                  ├── traffic-agent
  │                                  ├── log-agent
  │                                  ├── osint-agent
  │                                  └── exploit-agent
  • Kali MCP Server — nmap, sqlmap, john, hydra, metasploit, tshark, binwalk, and 14+ tools on your Kali VM
  • GPU Cracker — Remote RTX 4090 for hash cracking (100-200x faster than CPU)
  • Browser Automation — Scrape CyberSkyline challenges directly from Brave
  • Context System — Methodologies, tool references, common patterns per category
  • Volatility 3 — Pinned to working commit (pip version has regression)

See ARCHITECTURE.md for the full system design.

Documentation

Doc Description
SETUP.md Full installation and configuration guide
REQUIREMENTS.md Prerequisites and tool checklist
QUICK-START.md Command examples and learning workflows
ARCHITECTURE.md System architecture and design
TESTING.md Pre-competition verification checklist

Links

License

Copyright (c) 2026 Nigel Bazzeghin. All rights reserved.

About

AI-powered toolkit for National Cyber League (NCL) competitions — OpenCode agents + Kali MCP covering all 9 official categories with git-backed team coordination

Topics

Resources

License

Stars

Watchers

Forks

Packages