{"skill":{"slug":"ctf-pwn","displayName":"Ctf Pwn","summary":"Provides binary exploitation (pwn) techniques for CTF challenges. Use when exploiting buffer overflows, format strings, heap vulnerabilities (House of Orange...","tags":{"latest":"1.0.0"},"stats":{"comments":0,"downloads":290,"installsAllTime":0,"installsCurrent":0,"stars":0,"versions":1},"createdAt":1774866241012,"updatedAt":1774866709291},"latestVersion":{"version":"1.0.0","createdAt":1774866241012,"changelog":"Initial release of ctf-pwn skill for binary exploitation CTF challenges.\n\n- Quick reference for common pwn techniques: buffer overflows, ROP, heap attacks, format strings, kernel and Windows exploits, seccomp bypasses, and more.\n- Detailed resource links for common and advanced pwn topics (overflow, ROP, heap, kernel, sandbox, advanced exploits).\n- Platform setup instructions for required tools and Python/Ruby dependencies.\n- Pivoting section to help select the right skill for reverse, crypto, web, or misc challenges.\n- Quick start commands for binary analysis and exploitation workflow.","license":"MIT-0"},"metadata":null,"owner":{"handle":"gandli","userId":"s17c214vqwcqpk2wczqpbmyngd83xsas","displayName":"gandli","image":"https://avatars.githubusercontent.com/u/85359251?v=4"},"moderation":null}