Skip to main content
Back to the directory
ljagiello/ctf-skillsSoftware EngineeringFrontend and Design

ctf-pwn

Comprehensive binary exploitation reference covering stack overflows, ROP chains, heap attacks, kernel pwn, and advanced CTF techniques.

SkillJury keeps community verdicts, source metadata, and external repository signals in separate lanes so ranking data never pretends to be a review.

SkillJury verdict
Pending

No approved reviews yet

Would recommend
Pending

Waiting on enough review volume

Install signal
2

Weekly or total install activity from catalog data

Sign in to review
0 review requests
Install command
npx skills add https://github.com/ljagiello/ctf-skills --skill ctf-pwn
SkillJury does not have enough approved reviews to publish a community verdict yet. Source metadata and repository proof are still available above.
SkillJury Signal Summary

As of Apr 30, 2026, ctf-pwn has 2 weekly installs, 0 community reviews on SkillJury. Community votes currently stand at 0 upvotes and 0 downvotes. Source: ljagiello/ctf-skills. Canonical URL: https://skills.sh/ljagiello/ctf-skills/ctf-pwn.

Security audits
Gen Agent Trust HubPASS
SocketFAIL
SnykFAIL
About this skill
Comprehensive binary exploitation reference covering stack overflows, ROP chains, heap attacks, kernel pwn, and advanced CTF techniques. Quick reference for binary exploitation (pwn) CTF challenges. Each technique has a one-liner here; see supporting files for full details. Python packages (all platforms): Linux (apt): macOS (Homebrew): Ruby gems (all platforms): Manual install: Quick decision tree: ret2win with magic value: Overflow -> ret (alignment) -> pop rdi; ret -> magic -> win(). Stack alignment: SIGSEGV in movaps = add extra ret gadget. Offset: buffer at rbp - N , return at rbp + 8 , total = N + 8. Input filtering: assert payload avoids memmem() banned strings. Gadgets: ROPgadget --binary binary | grep "pop rdi" , or pwntools ROP() for hidden gadgets in CMP immediates.

Source description provided by the upstream listing. Community review signal and install context stay separate from this narrative layer.

Community reviews

Latest reviews

No community reviews yet. Be the first to review.

Browse this skill in context
FAQ
What does ctf-pwn do?

Comprehensive binary exploitation reference covering stack overflows, ROP chains, heap attacks, kernel pwn, and advanced CTF techniques.

Is ctf-pwn good?

ctf-pwn does not have approved reviews yet, so SkillJury cannot publish a community verdict.

Which AI agents support ctf-pwn?

ctf-pwn currently lists compatibility with Skills CLI.

Is ctf-pwn safe to install?

ctf-pwn has been scanned by security audit providers tracked on SkillJury. Check the security audits section on this page for detailed results from Socket.dev and Snyk.

What are alternatives to ctf-pwn?

Skills in the same category include grimoire-morpho-blue, conversation-memory, second-brain-ingest, zai-tts.

How do I install ctf-pwn?

Run the following command to install ctf-pwn: npx skills add https://github.com/ljagiello/ctf-skills --skill ctf-pwn

Related skills

More from ljagiello/ctf-skills

Related skills

Alternatives in Software Engineering