ctf-pwn

478 stars 51 forks
46

Solve CTF binary exploitation challenges by discovering and exploiting memory corruption vulnerabilities to read flags. Use for buffer overflows, format strings, heap exploits, ROP challenges, or any pwn/exploitation task.

Marketplace

Third-Party Agent Skill: Review the code before installing. Agent skills execute in your AI assistant's environment and can access your files. Learn more about security

Installation for Agentic Skill

View all platforms →
skilz install cyberkaida/reverse-engineering-assistant/ctf-pwn
skilz install cyberkaida/reverse-engineering-assistant/ctf-pwn --agent opencode
skilz install cyberkaida/reverse-engineering-assistant/ctf-pwn --agent codex
skilz install cyberkaida/reverse-engineering-assistant/ctf-pwn --agent gemini

First time? Install Skilz: pip install skilz

Works with 22+ AI coding assistants

Cursor, Aider, Copilot, Windsurf, Qwen, Kimi, and more...

View All Agents
Download Agent Skill ZIP

Extract and copy to ~/.claude/skills/ then restart Claude Desktop

1. Clone the repository:
git clone https://github.com/cyberkaida/reverse-engineering-assistant
2. Copy the agent skill directory:
cp -r reverse-engineering-assistant/ReVa/skills/ctf-pwn ~/.claude/skills/

Need detailed installation help? Check our platform-specific guides:

Related Agentic Skills

Agentic Skill Details

Stars
478
Forks
51
Type
Non-Technical
Meta-Domain
cloud infrastructure
Primary Domain
ansible
Market Score
46

Report Security Issue

Found a security vulnerability in this agent skill?