A series of CTF challenge solutions for binary exploit (or pwn) and reverse engineering (or rev) challenges 90% of this is Python pwntools with comments explaining the code and the vulnerable C programs. I may switch to markdown with python code embedded so it is easier to read.