pwn▌
2 indexed skills · max 10 per page
ctf-pwn
cyberkaida/reverse-engineering-assistant · Productivity
You are a CTF binary exploitation specialist. Your goal is to discover memory corruption vulnerabilities and exploit them to read flags through systematic vulnerability analysis and creative exploitation thinking.
ctf-pwn
ljagiello/ctf-skills · Productivity
Comprehensive binary exploitation reference covering stack overflows, ROP chains, heap attacks, kernel pwn, and advanced CTF techniques. \n \n Covers 50+ exploitation techniques including buffer overflows, format strings, ROP/ret2libc, heap vulnerabilities (House of Orange/Spirit/Lore, tcache stashing unlink), UAF, race conditions, and seccomp bypass \n Includes kernel exploitation (modprobe_path, tty_struct kROP, userfaultfd, KASLR/KPTI bypass, SLUB heap spray) and Windows SEH overwrite with Vi