Example of how you can create your own dojo
☆12Sep 2, 2025Updated 6 months ago
Alternatives and similar repositories for example-dojo
Users that are interested in example-dojo are comparing it to the libraries listed below
Sorting:
- CTF Challenge☆18Nov 20, 2020Updated 5 years ago
- ☆17Jan 27, 2022Updated 4 years ago
- Infrastructure powering the pwn.college dojo☆432Feb 24, 2026Updated last week
- This repository is used to teach you how to exploit basic binary vulnerabilities.☆33Sep 2, 2019Updated 6 years ago
- A python toolkit that I created to help me solve cryptography CTF challenges.☆10Jun 24, 2022Updated 3 years ago
- This JavaScript CLI "undeletes' packages that have been removed from the NPM registry☆29Dec 18, 2025Updated 2 months ago
- This is a PoC using native windows API directx, to hide and decrypt shellcode via compute shader☆10May 3, 2025Updated 10 months ago
- Software Exploitation☆11Sep 22, 2025Updated 5 months ago
- web ctf edu challs☆11Oct 15, 2023Updated 2 years ago
- Code and files specific to the AWS Certified Security - Specialty Exam Prep course☆10Jan 16, 2024Updated 2 years ago
- 《 算法竞赛入门经典》第二版(第2版)-例题习题解答☆10May 10, 2021Updated 4 years ago
- Binary exploitation exercises and scripts☆12Mar 15, 2022Updated 3 years ago
- A framework for lifting ARM32 to LLVM-IR and merging resulting code with LLVM-IR generated from source-code.☆12Oct 20, 2022Updated 3 years ago
- Auto Move Your Cursor to the Focused Window while You Alt-Tab or Touchboard for Windows☆10Dec 11, 2024Updated last year
- A python SDK for accessing the Keymate-API☆13Jun 25, 2024Updated last year
- ☆14Feb 12, 2026Updated 2 weeks ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Random Codes Related to Reverse Engineering☆10Nov 24, 2022Updated 3 years ago
- Frida module utils, writen in typescript☆16Jan 30, 2024Updated 2 years ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆18Apr 10, 2023Updated 2 years ago
- This course is published by Packt Publishing☆22Aug 2, 2023Updated 2 years ago
- Analyze coinbase orderbook in real-time in Python with Bytewax☆11Apr 23, 2024Updated last year
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- ☆30Feb 19, 2026Updated last week
- 107逢甲-安全程式設計-教材與CTF題目☆12Nov 2, 2019Updated 6 years ago
- ☆15Feb 25, 2026Updated last week
- ☆13Nov 14, 2024Updated last year
- The Hugr service☆27Feb 12, 2026Updated 2 weeks ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- TrueType/OpenType Font Library☆13Jan 16, 2026Updated last month
- eBPF Tools - Tool for monitoring, performance benchmarking and tracing linux kernel☆16Jan 29, 2021Updated 5 years ago
- An LLM leaderboard for stateful agents☆20Oct 16, 2025Updated 4 months ago
- An express middleware module for CAS authentication with Single Sign On Universitas Indonesia (SSO-UI)☆12Feb 6, 2019Updated 7 years ago
- ☆12Sep 30, 2024Updated last year
- Writeups from various CTFs solved with Mathematica☆10Apr 15, 2017Updated 8 years ago
- AI-driven PowerShell prompts for encryption, decryption, hashing, and key management. Secure your data with practical cryptographic solut…☆12Mar 4, 2025Updated 11 months ago
- Disputify - Visualisation for fault dispute games.☆12Jul 22, 2023Updated 2 years ago
- Write-ups and content for Curta puzzles, problems, etc.☆14Mar 25, 2024Updated last year