firmianay / Life-long-Learner
Personal Notes About Everything.
☆458Updated 3 years ago
Alternatives and similar repositories for Life-long-Learner:
Users that are interested in Life-long-Learner are comparing it to the libraries listed below
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆211Updated last year
- Writeups/solutions☆95Updated 4 years ago
- Tutorials for getting started with Pwntools☆1,428Updated 3 months ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆503Updated 6 months ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,747Updated 5 years ago
- A script to automatically install Peda+pwndbg+GEF plugins for gdb☆411Updated last year
- Infrastructure powering the pwn.college dojo☆318Updated this week
- Some CrackMe codes for Linux x86/x86_64☆353Updated last year
- Linux Binary Exploitation☆1,313Updated 3 years ago
- A sorted and updated list of security wargame sites.☆941Updated last week
- A set of Linux binary exploitation tasks for beginners on various architectures☆528Updated 3 years ago
- share some useful archives about vm and qemu escape exploit.☆536Updated 9 months ago
- Writeups for various CTFs☆620Updated 6 months ago
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆660Updated this week
- A colleciton of CTF write-ups all using pwntools☆507Updated 8 years ago
- ☆2,643Updated 6 months ago
- Writeup for picoCTF 2018☆125Updated 2 years ago
- CTF writeups from Balsn☆475Updated 2 years ago
- Some pwn challenges selected for training and education.☆379Updated last year
- My CTF journey since 2015. Stats, writeups, code snippets, notes, challenges.☆534Updated 5 months ago
- Provide powerful tools for seccomp analysis☆998Updated last week
- Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read☆1,256Updated 2 weeks ago
- Exercises to learn how to fuzz with American Fuzzy Lop☆1,240Updated 2 years ago
- A docker environment for pwn in ctf☆753Updated last year
- For Linux binary Exploitation☆823Updated 6 years ago
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆683Updated 3 months ago
- Reverse Engineering using Radare2☆308Updated 3 years ago
- gdb for pwn☆901Updated 5 months ago