pwncollege / example-dojoLinks
Example of how you can create your own dojo
☆12Updated 5 months ago
Alternatives and similar repositories for example-dojo
Users that are interested in example-dojo are comparing it to the libraries listed below
Sorting:
- Research browsers☆46Updated last month
- ☆131Updated 5 months ago
- Udemy – Linux Heap Exploitation☆54Updated 4 years ago
- Fuzzinglabs's audits, publications, workshops and reports☆29Updated 9 months ago
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆56Updated 3 years ago
- Source code and solution of CTF challenges that I created.☆45Updated 7 months ago
- 🐣 web3 CTF tool based on web3.py☆45Updated 3 weeks ago
- ☆22Updated 2 months ago
- MCP for Pwn☆205Updated this week
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Updated 11 months ago
- Leveraging patch diffing to discover new vulnerabilities☆139Updated last year
- Binary exploitation exercises and scripts☆12Updated 3 years ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆89Updated 2 months ago
- examples of using radius2 to solve reversing challenges☆36Updated last year
- My Personal Reading lists for CVE Writeups☆38Updated 4 years ago
- Challenge repository for ACSC 2024☆13Updated last year
- Monorepo for challenges, infra, and theming for UIUCTF 2024 (https://2024.uiuc.tf/)☆17Updated last year
- A tool for automating setup of kernel pwn challenges☆62Updated 3 months ago
- Binary Exploitation Phrack CTF Challenge☆70Updated 5 months ago
- The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.☆34Updated 5 years ago
- Source code for the DEF CON 31 CTF Qualifiers.☆127Updated 2 years ago
- Repo for talk slides & materials☆21Updated last year
- Linux kernel and browser exploit scripts for ctf challenges☆15Updated 9 months ago
- ☆23Updated 2 years ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆88Updated 6 months ago
- LiveCTF challenges and infrastructure at DEFCON 32 CTF☆21Updated 5 months ago
- A collection of web browser CTF challenges and solutions.☆32Updated 3 years ago
- ☆45Updated 5 months ago
- Linux Kernel N-day Exploit/Analysis.☆67Updated last year
- list of organizations offering vulnerability research/reverse engineering jobs☆109Updated this week