First, use wget to download the big-zip-files.zip file. Then unzip it.

wget https://artifacts.picoctf.net/c/503/big-zip-files.zip
unzip -u big-zip-files.zip

There are a lot of files. We can not search all of them manually for a flag. So we can use the following command instead that searches the contents of each file for a specific string pattern. We know that each flag follows this format -> picoCTF{random}

grep -rnw '/home/username/big-zip-files'/ -e 'picoCTF*'

The asterisk (*) after picoCTF searches for every string that has any combination of characters after that. For example, picoCTF{123} or picoCTF3ld/3#21. It can be anything.

Nice, you’ve got the flag.