
from reverse-engineering-assistant733
Framework and playbook for discovering and exploiting memory-corruption vulnerabilities (buffer overflows, format strings, heap exploits, ROP) to capture CTF fl
This skill provides a practical, repeatable framework for analyzing and exploiting memory-corruption vulnerabilities in CTF-style binaries. It walks an analyst through data-flow reasoning, memory-layout analysis, vulnerability discovery (unsafe APIs, stack/heap patterns), and exploitation planning (ROP, ret2libc, format-string primitives). The guidance focuses on what to look for, how to compute offsets, and which primitives to chain to reach a working payload, plus tools and investigation steps to use during analysis.
Use this skill when triaging or solving CTF pwn challenges: buffer overflows, format-string bugs, use-after-free, heap metadata corruption, or ROP/ret2libc tasks. It is intended for capture-the-flag problems and exploit development workflows where you need structured, tactical guidance.
Best paired with binary-analysis tools and agents that can call decompilers/debuggers (Ghidra, BinaryNinja, pwntools-driven runners) and assistants that support code reasoning and exploit scripting.
This skill has not been reviewed by our automated audit pipeline yet.