zardus / wargame-nexusView external linksLinks
A sorted and updated list of security wargame sites.
☆1,159Feb 9, 2026Updated last week
Alternatives and similar repositories for wargame-nexus
Users that are interested in wargame-nexus are comparing it to the libraries listed below
Sorting:
- A repository for learning various heap exploitation techniques.☆8,430Jan 15, 2026Updated last month
- Infrastructure powering the pwn.college dojo☆430Feb 7, 2026Updated last week
- Tutorials for getting started with Pwntools☆1,544Oct 1, 2024Updated last year
- Some setup scripts for security research tools.☆9,294Feb 9, 2026Updated last week
- ☆2,907Feb 8, 2026Updated last week
- Course materials for Modern Binary Exploitation by RPISEC☆5,924Dec 9, 2021Updated 4 years ago
- A collection of links related to Linux kernel security and exploitation☆6,346Jan 26, 2026Updated 3 weeks ago
- pwninit - automate starting binary exploit challenges☆1,064Dec 7, 2025Updated 2 months ago
- An step by step fuzzing tutorial. A GitHub Security Lab initiative☆3,709Jun 3, 2024Updated last year
- The best tool for finding one gadget RCE in libc.so.6☆2,300Updated this week
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆2,092Feb 28, 2025Updated 11 months ago
- Build a database of libc offsets to simplify exploitation☆1,853Oct 23, 2024Updated last year
- CTF framework and exploit development library☆13,250Jan 23, 2026Updated 3 weeks ago
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆373Mar 24, 2025Updated 10 months ago
- A curated list of CTF frameworks, libraries, resources and softwares☆11,245Jul 22, 2024Updated last year
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,817Jun 8, 2019Updated 6 years ago
- kernel-pwn and writeup collection☆695Oct 2, 2023Updated 2 years ago
- A powerful and user-friendly binary analysis platform!☆8,493Updated this week
- awesome list of browser exploitation tutorials☆2,260Sep 18, 2023Updated 2 years ago
- For Linux binary Exploitation☆843Mar 26, 2018Updated 7 years ago
- Exercises to learn how to fuzz with American Fuzzy Lop☆1,275Oct 12, 2022Updated 3 years ago
- GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Li…☆8,009Updated this week
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,742Apr 3, 2024Updated last year
- A collection of resources for linux reverse engineering☆2,069Jun 2, 2022Updated 3 years ago
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆9,995Updated this week
- Google CTF☆4,898Updated this week
- A Course on Intermediate Level Linux Exploitation☆1,007Aug 24, 2020Updated 5 years ago
- the challenge generation framework for pwn.college☆22Nov 19, 2025Updated 2 months ago
- Kernel development & exploitation practice environment.☆250Sep 10, 2023Updated 2 years ago
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆13,238Updated this week
- Linux Binary Exploitation☆1,356Jun 15, 2021Updated 4 years ago
- ☆1,101Mar 14, 2024Updated last year
- CTF Archives: Collection of CTF Challenges.☆1,364Updated this week
- Perfect Blue's CTF Writeups☆695Jun 24, 2024Updated last year
- A collection of vulnerable ARM binaries for practicing exploit development☆929Nov 15, 2021Updated 4 years ago
- ☆90Jun 15, 2022Updated 3 years ago
- An archive of low-level CTF challenges developed over the years☆652Nov 28, 2021Updated 4 years ago
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆717Oct 19, 2024Updated last year
- A linux-based assembly REPL for x86, amd64, armv7, and armv8☆1,257Mar 7, 2024Updated last year