pwncollege / challenges-old2View external linksLinks
Set of pre-generated pwn.college challenges
☆68Jan 24, 2023Updated 3 years ago
Alternatives and similar repositories for challenges-old2
Users that are interested in challenges-old2 are comparing it to the libraries listed below
Sorting:
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- Kernel development & exploitation practice environment.☆250Sep 10, 2023Updated 2 years ago
- Old and new CTFs about Linux kernel exploitation.☆64Mar 28, 2022Updated 3 years ago
- qiling framework examples☆16Jan 17, 2022Updated 4 years ago
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- Infrastructure powering the pwn.college dojo☆430Feb 7, 2026Updated last week
- Offical Writeups for n00bzCTF2023☆22Jun 15, 2023Updated 2 years ago
- A monitoring script for AFL☆41Feb 8, 2017Updated 9 years ago
- A python script to hide information over an audio file in .wav format☆19Oct 7, 2017Updated 8 years ago
- Subdomain Enumeration Tool☆12Jan 16, 2021Updated 5 years ago
- ☆13Feb 7, 2020Updated 6 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆14Mar 22, 2022Updated 3 years ago
- ☆29May 1, 2020Updated 5 years ago
- ☆29Nov 14, 2022Updated 3 years ago
- A dojo to teach the basics of low-level computing.☆19Jan 28, 2026Updated 2 weeks ago
- The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.☆34Jan 22, 2021Updated 5 years ago
- Notes for Assembly language☆15Jul 28, 2020Updated 5 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Jan 24, 2021Updated 5 years ago
- All challenges from DiceCTF 2023☆74Feb 6, 2023Updated 3 years ago
- A patched QEMU that exposes an interface for LibAFL-based fuzzers☆92Jan 6, 2026Updated last month
- tools for shellcoding☆59Aug 12, 2023Updated 2 years ago
- Listing of official dojos☆23Nov 7, 2025Updated 3 months ago
- Write and execute PHP with only 6 different characters: ([.^])☆19Sep 5, 2021Updated 4 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Full Deobfuscator for PEUnion 4.0.0 (.NET & PE32)☆23Apr 21, 2022Updated 3 years ago
- All android crackme challenges, created by me.☆22Oct 12, 2021Updated 4 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- BestRecon is a browser-based recon tool to gather information about your target and analyze their security on browser.☆11Jan 1, 2021Updated 5 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- Herramienta en desarrollo la cual busca la sencillez a la hora de hacer PenTesting Ethicos. [NO ME HAGO RESPONSABLE DEL MAL USO DE ESTA H…☆10Aug 1, 2023Updated 2 years ago
- Linux network namespace sysctl safety verifier.☆11Jun 20, 2021Updated 4 years ago
- My attempt to turn Emacs into VSCode☆10May 19, 2025Updated 8 months ago
- ROP Wargame repository☆27Sep 11, 2017Updated 8 years ago
- First level taint implementation with qemu for linux user mode☆28Aug 11, 2020Updated 5 years ago
- A community driven resource for learning CryptoGraphy☆70Apr 19, 2023Updated 2 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆38Oct 23, 2018Updated 7 years ago
- CopyToAsm (x64) - A Plugin For x64dbg☆31Jul 17, 2018Updated 7 years ago
- Install any apk into dual app space☆27Jan 28, 2022Updated 4 years ago
- ☆12Jun 12, 2021Updated 4 years ago