A dense reference library for turning memory corruption into shells during CTFs. You'll reach for this when you've already identified the vulnerability class and need execution recipes: stack pivots, SROP with encoding constraints, tcache poisoning variants, FILE structure hijacks, seccomp bypasses, or any of the thirty-plus writeup-derived techniques across eleven supporting files. The scope is admirably narrow. It won't help you reverse the binary or understand what's broken, but once you know you have a format string or heap UAF, you get concrete exploit chains including edge cases like single-bit flips, bloom filter OOB writes, and Windows SEH overwrite. Best used alongside a reversing skill when the challenge has multiple phases.
npx skills add https://github.com/ljagiello/ctf-skills --skill ctf-pwn