pentest-ctf-binary

Binary exploitation (Pwn) and reverse engineering tools for CTF challenges and software analysis.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "pentest-ctf-binary" with this command: npx skills add jd-opensource/joysafeter/jd-opensource-joysafeter-pentest-ctf-binary

Pentest CTF Binary

Purpose

Analyze binary files to understand their behavior, identify memory corruption vulnerabilities, and develop exploits (ROP, Heap, Format String).

Core Workflow

  1. Static Analysis: Inspect binary properties, protections (NX, PIE), and code structure using checksec and ghidra.
  2. Dynamic Analysis: Run the binary under a debugger (gdb) to observe behavior and register states.
  3. Vulnerability Identification: Locate crashes, buffer overflows, or format string bugs.
  4. Exploit Development: Construct payloads (shellcode, ROP chains) using pwntools.
  5. Remote Exploitation: Launch the exploit against the target server to retrieve the flag.

References

  • references/tools.md
  • references/workflows.md

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

pentest-mobile-app

No summary provided by upstream source.

Repository SourceNeeds Review
General

pentest-osint-recon

No summary provided by upstream source.

Repository SourceNeeds Review
General

pentest-exploit-validation

No summary provided by upstream source.

Repository SourceNeeds Review