pwn-exploits
CommunityStreamline binary exploitation workflows for CTFs.
AuthorG36maid
Version1.0.0
Installs0
System Documentation
What problem does it solve?
Binary exploitation challenges in CTFs are often tedious and error-prone, requiring manual setup, repetitive boilerplate, and scattered references. This Skill consolidates patterns, templates, and references to accelerate exploit development and learning.
Core Features & Use Cases
- Templates & templates: Pwntools-based templates for local/remote exploitation, including GDB/pwndbg integration and automated start modes.
- Gadget & tooling references: Quick access to gadget hunting, leaks, and ret2libc workflows; supports static and dynamic analysis workflows.
- Use Case: A student can start from a vulnerability like a buffer overflow, reuse the provided pwn_basic.py or pwn_rop.py templates to craft a working exploit without building everything from scratch.
Quick Start
Start by loading the skill, examining the templates, and running the basic template locally to trigger a shell or verify vulnerability.
Dependency Matrix
Required Modules
None requiredComponents
references
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: pwn-exploits Download link: https://github.com/G36maid/ctf-arsenal/archive/main.zip#pwn-exploits Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.