pwncollege / dojo
Infrastructure powering the pwn.college dojo
☆356Updated last week
Alternatives and similar repositories for dojo
Users that are interested in dojo are comparing it to the libraries listed below
Sorting:
- Kernel development & exploitation practice environment.☆231Updated last year
- A full English version of the popular ctf-wiki☆93Updated 10 months ago
- ☆163Updated 2 years ago
- pwninit - automate starting binary exploit challenges☆935Updated 9 months ago
- My notes on pwn☆284Updated last month
- Source code for the 2022 DEF CON Qualifiers.☆265Updated 11 months ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆205Updated 10 months ago
- Write-ups for various CTF☆190Updated last year
- kernel-pwn and writeup collection☆614Updated last year
- knowledge is power☆215Updated last week
- My write-ups from various CTFs☆118Updated last year
- ctfcli is a tool to manage Capture The Flag events and challenges☆188Updated last week
- Windows Pwnable Study☆351Updated 4 years ago
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆216Updated 2 years ago
- Perfect Blue's CTF Writeups☆678Updated 10 months ago
- CTF writeups from The Flat Network Society☆133Updated 4 months ago
- A script to automatically install Peda+pwndbg+GEF plugins for gdb☆434Updated last year
- ☆90Updated last year
- Set of pre-generated pwn.college challenges☆66Updated 2 years ago
- CTF Reversing Challenges List☆275Updated 5 years ago
- angr tutorial for ctf☆150Updated 4 years ago
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆319Updated last month
- helps visualize heap operations for pwn and debugging☆319Updated 2 years ago
- Some pwn challenges selected for training and education.☆384Updated last year
- Files + Writeups for DownUnderCTF 2023 Challenges☆170Updated last year
- Collection of browser challenges☆136Updated 4 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆509Updated 10 months ago
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆693Updated 6 months ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆475Updated this week
- Python library for CTFer☆143Updated 3 weeks ago