Revisited my #OverTheWire solutions because they apparently adjusted the flags and machines and figured out two things in the process:
- When using #pwnlib, it's very tempting to use their gdb helpers to programmatically interact with gdb and extract program state from it. This turns out not to be intended, it's merely assistance so that you can have gdb running alongside with your exploit for easy debugging of a process. I ended up launching a regular process querying gdb for information about register/memory state.
- The #Emacs markdown-mode has a useful `TAB` command that either cycles visibility of headlines or toggles between indenting the current line (which can be used to quickly indent/unindent code)