ctf-pwn

Installation
Summary

Comprehensive binary exploitation reference covering stack overflows, ROP chains, heap attacks, kernel pwn, and advanced CTF techniques.

  • Covers 50+ exploitation techniques including buffer overflows, format strings, ROP/ret2libc, heap vulnerabilities (House of Orange/Spirit/Lore, tcache stashing unlink), UAF, race conditions, and seccomp bypass
  • Includes kernel exploitation (modprobe_path, tty_struct kROP, userfaultfd, KASLR/KPTI bypass, SLUB heap spray) and Windows SEH overwrite with VirtualAlloc ROP
  • Provides quick decision trees for protection bypass (PIE/RELRO/NX/canary), gadget finding, and exploit chain construction with code patterns for common scenarios
  • Organized into 11 supporting markdown files covering basics, ROP/shellcode, advanced techniques, format strings, kernel methods, and sandbox escape with real CTF examples
SKILL.md

CTF Binary Exploitation (Pwn)

Quick reference for binary exploitation (pwn) CTF challenges. Each technique has a one-liner here; see supporting files for full details.

Prerequisites

Python packages (all platforms):

pip install pwntools ropper ROPgadget

Linux (apt):

apt install gdb binutils strace ltrace qemu-system-x86

macOS (Homebrew):

brew install gdb binutils qemu
Related skills

More from ljagiello/ctf-skills

Installs
3.4K
GitHub Stars
2.0K
First Seen
Feb 1, 2026