pwn-exploits
Installation
SKILL.md
Binary Exploitation Patterns
When to Use
Load this skill when:
- Solving binary exploitation (pwn) CTF challenges
- Working with buffer overflows and stack-based vulnerabilities
- Building ROP (Return-Oriented Programming) chains
- Writing shellcode or exploits
- Using pwntools for exploitation
- Analyzing binaries with GDB, checksec, or strings
Binary Analysis Workflow
Step 1: Static Analysis First
Always begin with static analysis before dynamic exploitation.
Related skills