ctf-pwn by cyberkaida

Solve CTF binary exploitation challenges by discovering and exploiting memory corruption vulnerabilities to read flags. Use for buffer overflows, format strings, heap exploits, ROP challenges, or any pwn/exploitation task.

Content & Writing
608 Stars
55 Forks
Updated Nov 8, 2025, 10:07 AM

Why Use This

This skill provides specialized capabilities for cyberkaida's codebase.

Use Cases

  • Developing new features in the cyberkaida repository
  • Refactoring existing code to follow cyberkaida standards
  • Understanding and working with cyberkaida's codebase structure

Install Guide

2 steps
  1. 1

    Download Ananke

    Skip this step if Ananke is already installed.

  2. 2

    Install inside Ananke

    Click Install Skill, paste the link below, then press Install.

    https://github.com/cyberkaida/reverse-engineering-assistant/tree/main/ReVa/skills/ctf-pwn

Skill Snapshot

Auto scan of skill assets. Informational only.

Valid SKILL.md

Checks against SKILL.md specification

Source & Community

Skill Version
main
Community
608 55
Updated At Nov 8, 2025, 10:07 AM

Skill Stats

SKILL.md 533 Lines
Total Files 2
Total Size 21.9 KB
License Apache-2.0