Back to skills
SkillHub ClubShip Full StackFull Stack

ctf-pwn

Solve CTF binary exploitation challenges by discovering and exploiting memory corruption vulnerabilities to read flags. Use for buffer overflows, format strings, heap exploits, ROP challenges, or any pwn/exploitation task.

Packaged view

This page reorganizes the original catalog entry around fit, installability, and workflow context first. The original raw source lives below.

Stars
642
Hot score
99
Updated
March 20, 2026
Overall rating
C5.2
Composite score
5.2
Best-practice grade
B71.9

Install command

npx @skill-hub/cli install cyberkaida-reverse-engineering-assistant-ctf-pwn

Repository

cyberkaida/reverse-engineering-assistant

Skill path: ReVa/skills/ctf-pwn

Solve CTF binary exploitation challenges by discovering and exploiting memory corruption vulnerabilities to read flags. Use for buffer overflows, format strings, heap exploits, ROP challenges, or any pwn/exploitation task.

Open repository

Best for

Primary workflow: Ship Full Stack.

Technical facets: Full Stack.

Target audience: Development teams looking for install-ready agent workflows..

License: Unknown.

Original source

Catalog source: SkillHub Club.

Repository owner: cyberkaida.

This is still a mirrored public skill entry. Review the repository before installing into production workflows.

What it helps with

  • Install ctf-pwn into Claude Code, Codex CLI, Gemini CLI, or OpenCode workflows
  • Review https://github.com/cyberkaida/reverse-engineering-assistant before adding ctf-pwn to shared team environments
  • Use ctf-pwn for development workflows

Works across

Claude CodeCodex CLIGemini CLIOpenCode

Favorites: 0.

Sub-skills: 0.

Aggregator: No.

ctf-pwn | SkillHub