Babysitter Pwntools Exploitation Skill
Exploit development automation using pwntools framework
install
source · Clone the upstream repo
git clone https://github.com/a5c-ai/babysitter
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/a5c-ai/babysitter "$T" && mkdir -p ~/.claude/skills && cp -r "$T/library/specializations/security-research/skills/pwntools-exploit" ~/.claude/skills/a5c-ai-babysitter-pwntools-exploitation-skill && rm -rf "$T"
manifest:
library/specializations/security-research/skills/pwntools-exploit/SKILL.mdsource content
Pwntools Exploitation Skill
Overview
This skill provides exploit development automation capabilities using the pwntools framework for binary exploitation.
Capabilities
- Generate pwntools exploit templates
- Build ROP chains using ROPgadget
- Create shellcode with pwntools shellcraft
- Manage exploit process I/O (tubes)
- Handle remote and local exploitation
- Parse ELF binaries for gadgets
- Generate payload encoders
- Debug exploits with GDB integration
Target Processes
- exploit-development.js
- shellcode-development.js
- capture-the-flag-challenges.js
- network-penetration-testing.js
Dependencies
- pwntools (Python library)
- ROPgadget
- GDB with pwndbg or gef
- Python 3.x
- binutils (objdump, readelf)
Usage Context
This skill is essential for:
- Binary exploitation development
- CTF challenge solving (pwn category)
- Proof-of-concept exploit creation
- ROP chain construction
- Shellcode development and testing
Integration Notes
- Supports both local and remote exploitation
- Integrates with GDB for debugging
- Can generate standalone exploit scripts
- Supports various architectures (x86, x64, ARM)
- Includes payload encoding for filter bypass