Set of pre-generated pwn.college challenges
☆68Jan 24, 2023Updated 3 years ago
Alternatives and similar repositories for challenges-old2
Users that are interested in challenges-old2 are comparing it to the libraries listed below
Sorting:
- Kernel development & exploitation practice environment.☆249Sep 10, 2023Updated 2 years ago
- Old and new CTFs about Linux kernel exploitation.☆64Mar 28, 2022Updated 3 years ago
- qiling framework examples☆16Jan 17, 2022Updated 4 years ago
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- Infrastructure powering the pwn.college dojo☆432Updated this week
- A monitoring script for AFL☆41Feb 8, 2017Updated 9 years ago
- A python script to hide information over an audio file in .wav format☆19Oct 7, 2017Updated 8 years ago
- Subdomain Enumeration Tool☆12Jan 16, 2021Updated 5 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆13Mar 22, 2022Updated 3 years ago
- ☆29May 1, 2020Updated 5 years ago
- ☆29Nov 14, 2022Updated 3 years ago
- A dojo to teach the basics of low-level computing.☆20Feb 17, 2026Updated 2 weeks ago
- The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.☆34Jan 22, 2021Updated 5 years ago
- Notes for Assembly language☆15Jul 28, 2020Updated 5 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Jan 24, 2021Updated 5 years ago
- All challenges from DiceCTF 2023☆74Feb 6, 2023Updated 3 years ago
- A patched QEMU that exposes an interface for LibAFL-based fuzzers☆93Jan 6, 2026Updated 2 months ago
- De4dot MOD with few unpackers added☆14Oct 11, 2016Updated 9 years ago
- Quixotic Color Scheme for Papirus Icons☆19Aug 16, 2022Updated 3 years ago
- Write and execute PHP with only 6 different characters: ([.^])☆19Sep 5, 2021Updated 4 years ago
- Listing of official dojos☆23Nov 7, 2025Updated 4 months ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Full Deobfuscator for PEUnion 4.0.0 (.NET & PE32)☆23Apr 21, 2022Updated 3 years ago
- All android crackme challenges, created by me.☆22Oct 12, 2021Updated 4 years ago
- Twin-Hex Cipher Encoder/Decoder☆21Jul 23, 2023Updated 2 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Herramienta en desarrollo la cual busca la sencillez a la hora de hacer PenTesting Ethicos. [NO ME HAGO RESPONSABLE DEL MAL USO DE ESTA H…☆11Aug 1, 2023Updated 2 years ago
- My attempt to turn Emacs into VSCode☆10May 19, 2025Updated 9 months ago
- Linux network namespace sysctl safety verifier.☆11Jun 20, 2021Updated 4 years ago
- BestRecon is a browser-based recon tool to gather information about your target and analyze their security on browser.☆11Jan 1, 2021Updated 5 years ago
- ROP Wargame repository☆27Sep 11, 2017Updated 8 years ago
- OSS-Fuzz Public Corpora Crawler☆30Feb 23, 2023Updated 3 years ago
- First level taint implementation with qemu for linux user mode☆28Aug 11, 2020Updated 5 years ago
- A community driven resource for learning CryptoGraphy☆71Apr 19, 2023Updated 2 years ago
- CopyToAsm (x64) - A Plugin For x64dbg☆31Jul 17, 2018Updated 7 years ago
- Install any apk into dual app space☆27Jan 28, 2022Updated 4 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆38Oct 23, 2018Updated 7 years ago
- View emails in Discord using Cloudflare Email Routing☆10Dec 15, 2023Updated 2 years ago