pwncollege / dojo
Infrastructure powering the pwn.college dojo
☆340Updated this week
Alternatives and similar repositories for dojo:
Users that are interested in dojo are comparing it to the libraries listed below
- Kernel development & exploitation practice environment.☆223Updated last year
- Source code for the 2022 DEF CON Qualifiers.☆265Updated 10 months ago
- Write-ups for various CTF☆187Updated last year
- A script to automatically install Peda+pwndbg+GEF plugins for gdb☆423Updated last year
- ☆161Updated 2 years ago
- kernel-pwn and writeup collection☆600Updated last year
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆193Updated 8 months ago
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆213Updated last year
- Windows Pwnable Study☆338Updated 4 years ago
- Perfect Blue's CTF Writeups☆672Updated 9 months ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆443Updated this week
- An updated collection of resources targeting browser-exploitation.☆814Updated 4 years ago
- My notes on pwn☆277Updated last week
- helps visualize heap operations for pwn and debugging☆315Updated 2 years ago
- My write-ups from various CTFs☆118Updated last year
- A full English version of the popular ctf-wiki☆90Updated 8 months ago
- ☆87Updated 10 months ago
- repository for kernel exploit practice☆396Updated 5 years ago
- Set of pre-generated pwn.college challenges☆65Updated 2 years ago
- All Files, Scripts, and exploits can be found here☆61Updated 3 years ago
- A blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative☆495Updated 5 months ago
- Collection of browser challenges☆130Updated 3 years ago
- Fuzz anything with Program Environment Fuzzing☆378Updated 2 months ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆508Updated 9 months ago
- ☆109Updated 4 months ago
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆309Updated this week
- PAWNYABLE!☆207Updated 10 months ago
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆688Updated 5 months ago
- ☆124Updated last year
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆674Updated last week