pwn-exploits

Community

Streamline binary exploitation workflows for CTFs.

AuthorG36maid
Version1.0.0
Installs0

System Documentation

What problem does it solve?

Binary exploitation challenges in CTFs are often tedious and error-prone, requiring manual setup, repetitive boilerplate, and scattered references. This Skill consolidates patterns, templates, and references to accelerate exploit development and learning.

Core Features & Use Cases

  • Templates & templates: Pwntools-based templates for local/remote exploitation, including GDB/pwndbg integration and automated start modes.
  • Gadget & tooling references: Quick access to gadget hunting, leaks, and ret2libc workflows; supports static and dynamic analysis workflows.
  • Use Case: A student can start from a vulnerability like a buffer overflow, reuse the provided pwn_basic.py or pwn_rop.py templates to craft a working exploit without building everything from scratch.

Quick Start

Start by loading the skill, examining the templates, and running the basic template locally to trigger a shell or verify vulnerability.

Dependency Matrix

Required Modules

None required

Components

references

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: pwn-exploits
Download link: https://github.com/G36maid/ctf-arsenal/archive/main.zip#pwn-exploits

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.