Babysitter Binary Exploitation Skill
Advanced binary exploitation and mitigation bypass
install
source · Clone the upstream repo
git clone https://github.com/a5c-ai/babysitter
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/a5c-ai/babysitter "$T" && mkdir -p ~/.claude/skills && cp -r "$T/library/specializations/security-research/skills/binary-exploitation" ~/.claude/skills/a5c-ai-babysitter-binary-exploitation-skill && rm -rf "$T"
manifest:
library/specializations/security-research/skills/binary-exploitation/SKILL.mdtags
source content
Binary Exploitation Skill
Overview
This skill provides advanced binary exploitation capabilities including mitigation bypass techniques.
Capabilities
- Identify exploitation primitives
- Analyze memory corruption types
- Calculate offsets and gadgets
- Bypass ASLR/PIE/NX/Canaries
- Generate heap exploitation chains
- Support kernel exploitation
- Create type confusion exploits
- Handle JIT compilation exploits
Target Processes
- exploit-development.js
- shellcode-development.js
- binary-reverse-engineering.js
- capture-the-flag-challenges.js
Dependencies
- GDB with pwndbg or gef
- ROPgadget
- one_gadget
- pwntools
- checksec
- Python 3.x
Usage Context
This skill is essential for:
- Advanced exploit development
- Mitigation bypass research
- Kernel exploitation
- Browser/JIT exploitation
- Heap exploitation
Integration Notes
- Supports multiple architectures
- Can automate common exploitation patterns
- Integrates with debugging tools
- Supports both userland and kernel
- Can generate reliable exploits