·ctf-pwn
</>

ctf-pwn

ramzxy/ctf

Binary exploitation (pwn) techniques for CTF challenges. Use when exploiting buffer overflows, format strings, heap vulnerabilities, race conditions, or kernel bugs.

6Installs·0Trend·@ramzxy

Installation

$npx skills add https://github.com/ramzxy/ctf --skill ctf-pwn

SKILL.md

Quick reference for pwn challenges. For detailed techniques, see supporting files.

FUSE (Filesystem in Userspace) / CUSE (Character device in Userspace)

| PIE | Disabled | All addresses (GOT, PLT, functions) are fixed - direct overwrites work | | RELRO | Partial | GOT is writable - GOT overwrite attacks possible | | RELRO | Full | GOT is read-only - need alternative targets (hooks, vtables, return addr) | | NX | Enabled | Can't execute shellcode on stack/heap - use ROP or ret2win |

Binary exploitation (pwn) techniques for CTF challenges. Use when exploiting buffer overflows, format strings, heap vulnerabilities, race conditions, or kernel bugs. Source: ramzxy/ctf.

View raw

Facts (cite-ready)

Stable fields and commands for AI/search citations.

Install command
npx skills add https://github.com/ramzxy/ctf --skill ctf-pwn
Category
</>Dev Tools
Verified
First Seen
2026-02-11
Updated
2026-02-18

Quick answers

What is ctf-pwn?

Binary exploitation (pwn) techniques for CTF challenges. Use when exploiting buffer overflows, format strings, heap vulnerabilities, race conditions, or kernel bugs. Source: ramzxy/ctf.

How do I install ctf-pwn?

Open your terminal or command line tool (Terminal, iTerm, Windows Terminal, etc.) Copy and run this command: npx skills add https://github.com/ramzxy/ctf --skill ctf-pwn Once installed, the skill will be automatically configured in your AI coding environment and ready to use in Claude Code or Cursor

Where is the source repository?

https://github.com/ramzxy/ctf

Details

Category
</>Dev Tools
Source
skills.sh
First Seen
2026-02-11