pwncollege / challenges
Set of pre-generated pwn.college challenges
☆64Updated 2 years ago
Alternatives and similar repositories for challenges:
Users that are interested in challenges are comparing it to the libraries listed below
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 3 years ago
- All Files, Scripts, and exploits can be found here☆60Updated 3 years ago
- ☆45Updated last year
- ☆27Updated 2 years ago
- RE / Binary Exploitation Resources☆69Updated 7 years ago
- ☆159Updated 2 years ago
- CTFs and solutions for Linux binary exploitation.☆108Updated 8 months ago
- Slides from our technical talks☆28Updated 3 months ago
- esoteric☆51Updated 4 years ago
- archive of the released challenges from corCTF 2021☆22Updated 3 years ago
- ☆109Updated 3 months ago
- Challenge repository for the 2023 CSAW CTF Qualifiers☆29Updated last year
- Udemy – Linux Heap Exploitation☆39Updated 3 years ago
- Kernel development & exploitation practice environment.☆220Updated last year
- Automatic ROPChain Generation☆284Updated 5 years ago
- Collection of pwn techniques☆28Updated 3 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆97Updated last week
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆11Updated last year
- Source code for the 2022 DEF CON Qualifiers.☆265Updated 8 months ago
- Very simple script(s) to hasten binary exploit creation☆92Updated 3 years ago
- ☆46Updated 6 years ago
- ☆32Updated last week
- Collection of browser challenges☆123Updated 3 years ago
- Source code and solution of CTF challenges that I created.☆45Updated 8 months ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆87Updated last year
- All challenges from DiceCTF 2023☆72Updated 2 years ago
- ☆124Updated last year
- My write-ups from various CTFs☆115Updated last year
- Challenge source code, official writeups, and infrastructure setup for UIUCTF 2023☆41Updated last year
- The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.☆30Updated 4 years ago