pwncollege / dojo
Infrastructure powering the pwn.college dojo
☆303Updated this week
Related projects ⓘ
Alternatives and complementary repositories for dojo
- ☆158Updated 2 years ago
- A script to automatically install Peda+pwndbg+GEF plugins for gdb☆401Updated last year
- Source code for the 2022 DEF CON Qualifiers.☆264Updated 5 months ago
- Kernel development & exploitation practice environment.☆212Updated last year
- Write-ups for various CTF☆178Updated 8 months ago
- A full English version of the popular ctf-wiki☆80Updated 4 months ago
- My write-ups from various CTFs☆114Updated 10 months ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆173Updated 4 months ago
- My notes on pwn☆262Updated 2 months ago
- kernel-pwn and writeup collection☆568Updated last year
- Set of pre-generated pwn.college challenges☆61Updated last year
- knowledge is power☆205Updated 7 months ago
- pwninit - automate starting binary exploit challenges☆884Updated 3 months ago
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆211Updated last year
- CTF writeups from The Flat Network Society☆127Updated 4 months ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆393Updated this week
- Very simple script(s) to hasten binary exploit creation☆91Updated 3 years ago
- Python library for CTFer☆130Updated last week
- helps visualize heap operations for pwn and debugging☆306Updated last year
- This repo is aim to compile all Flare-On challenge's binaries. Update: 2014 -2022.☆298Updated 2 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆501Updated 4 months ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆48Updated last year
- ☆67Updated 6 months ago
- RE / Binary Exploitation Resources☆67Updated 6 years ago
- Perfect Blue's CTF Writeups☆667Updated 5 months ago
- Windows Pwnable Study☆323Updated 4 years ago
- An updated collection of resources targeting browser-exploitation.☆810Updated 3 years ago
- 'Ike: A binary exploitation and reversing handbook.☆69Updated last year
- A blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative☆475Updated last month