·pwn-exploits
</>

pwn-exploits

g36maid/ctf-arsenal

Binary exploitation patterns using pwntools for buffer overflows, ROP chains, and shellcode in CTF challenges. Trigger: When solving pwn challenges, buffer overflows, ROP chains, or writing exploits.

5Installs·0Trend·@g36maid

Installation

$npx skills add https://github.com/g36maid/ctf-arsenal --skill pwn-exploits

SKILL.md

| PIE | Enabled | Need address leak for code/data addresses | | PIE | Disabled | Can use hardcoded addresses directly | | NX | Enabled | Cannot execute shellcode on stack, use ROP | | NX | Disabled | Can write shellcode to buffer and execute | | Stack Canary | Enabled | Need canary leak or bypass technique |

| Stack Canary | Disabled | Direct buffer overflow exploitation | | RELRO Full | Enabled | Cannot overwrite GOT entries | | RELRO Partial | Enabled | Can overwrite GOT for hijacking |

| Generate cyclic pattern | cyclic(500) | | Find offset from crash | cyclicfind(b'caaa') or cyclicfind(0x61616161) | | Pack 64-bit integer | p64(0x401000) | | Pack 32-bit integer | p32(0x08048000) | | Unpack 64-bit bytes | u64(data.ljust(8, b'\x00')) | | Unpack 32-bit bytes | u32(data.ljust(4, b'\x00')) |

View raw

Facts (cite-ready)

Stable fields and commands for AI/search citations.

Install command
npx skills add https://github.com/g36maid/ctf-arsenal --skill pwn-exploits
Category
</>Dev Tools
Verified
First Seen
2026-02-11
Updated
2026-02-18

Quick answers

What is pwn-exploits?

Binary exploitation patterns using pwntools for buffer overflows, ROP chains, and shellcode in CTF challenges. Trigger: When solving pwn challenges, buffer overflows, ROP chains, or writing exploits. Source: g36maid/ctf-arsenal.

How do I install pwn-exploits?

Open your terminal or command line tool (Terminal, iTerm, Windows Terminal, etc.) Copy and run this command: npx skills add https://github.com/g36maid/ctf-arsenal --skill pwn-exploits Once installed, the skill will be automatically configured in your AI coding environment and ready to use in Claude Code or Cursor

Where is the source repository?

https://github.com/g36maid/ctf-arsenal

Details

Category
</>Dev Tools
Source
skills.sh
First Seen
2026-02-11