Set of pre-generated pwn.college challenges
☆68Jan 24, 2023Updated 3 years ago
Alternatives and similar repositories for challenges-old2
Users that are interested in challenges-old2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- Kernel development & exploitation practice environment.☆251Sep 10, 2023Updated 2 years ago
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Mar 7, 2021Updated 5 years ago
- Infrastructure powering the pwn.college dojo☆434Mar 3, 2026Updated 3 weeks ago
- ☆29May 1, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- A dojo to teach the basics of low-level computing.☆23Feb 17, 2026Updated last month
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆13Mar 22, 2022Updated 4 years ago
- Old and new CTFs about Linux kernel exploitation.☆64Mar 28, 2022Updated 3 years ago
- Subdomain Enumeration Tool☆12Jan 16, 2021Updated 5 years ago
- A monitoring script for AFL☆41Feb 8, 2017Updated 9 years ago
- The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.☆36Jan 22, 2021Updated 5 years ago
- ☆29Nov 14, 2022Updated 3 years ago
- A python script to hide information over an audio file in .wav format☆19Oct 7, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Jan 24, 2021Updated 5 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- ☆14Jan 16, 2020Updated 6 years ago
- Full Deobfuscator for PEUnion 4.0.0 (.NET & PE32)☆23Apr 21, 2022Updated 3 years ago
- Offical Writeups for n00bzCTF2023☆22Jun 15, 2023Updated 2 years ago
- Listing of official dojos☆24Nov 7, 2025Updated 4 months ago
- BestRecon is a browser-based recon tool to gather information about your target and analyze their security on browser.☆11Jan 1, 2021Updated 5 years ago
- CopyToAsm (x64) - A Plugin For x64dbg☆31Jul 17, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- tools for shellcoding☆59Aug 12, 2023Updated 2 years ago
- 📨 Quick tool to finds and extract email addresses from a body of text☆12Apr 15, 2023Updated 2 years ago
- All challenges from DiceCTF 2023☆74Feb 6, 2023Updated 3 years ago
- ☆13Feb 7, 2020Updated 6 years ago
- A community driven resource for learning CryptoGraphy☆71Apr 19, 2023Updated 2 years ago
- A patched QEMU that exposes an interface for LibAFL-based fuzzers☆94Jan 6, 2026Updated 2 months ago
- ROP Wargame repository☆27Sep 11, 2017Updated 8 years ago
- Use Ghidra Structs in Python☆30Mar 28, 2021Updated 4 years ago
- generate yara-androguard report on your local and scan☆12Oct 3, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆12Jun 12, 2021Updated 4 years ago
- First level taint implementation with qemu for linux user mode☆28Aug 11, 2020Updated 5 years ago
- SI485H: Stack Based Binary Exploits (United States Naval Academy) -- public version☆23Nov 25, 2018Updated 7 years ago
- Example of how you can create your own dojo☆12Sep 2, 2025Updated 6 months ago
- My attempt to turn Emacs into VSCode☆10May 19, 2025Updated 10 months ago
- A tool pulls loaded binaries ordered by memory regions☆35Sep 27, 2019Updated 6 years ago
- Simple GUI app to simplify manual string decryption with de4dot☆27Jan 25, 2022Updated 4 years ago