A sorted and updated list of security wargame sites.
☆1,173Feb 27, 2026Updated last week
Alternatives and similar repositories for wargame-nexus
Users that are interested in wargame-nexus are comparing it to the libraries listed below
Sorting:
- A repository for learning various heap exploitation techniques.☆8,450Jan 15, 2026Updated last month
- Infrastructure powering the pwn.college dojo☆432Updated this week
- Tutorials for getting started with Pwntools☆1,547Oct 1, 2024Updated last year
- Some setup scripts for security research tools.☆9,315Mar 1, 2026Updated last week
- ☆2,934Feb 8, 2026Updated last month
- Course materials for Modern Binary Exploitation by RPISEC☆5,939Dec 9, 2021Updated 4 years ago
- A collection of links related to Linux kernel security and exploitation☆6,368Updated this week
- pwninit - automate starting binary exploit challenges☆1,077Dec 7, 2025Updated 3 months ago
- An step by step fuzzing tutorial. A GitHub Security Lab initiative☆3,720Jun 3, 2024Updated last year
- The best tool for finding one gadget RCE in libc.so.6☆2,300Updated this week
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆2,100Feb 28, 2025Updated last year
- Build a database of libc offsets to simplify exploitation☆1,854Oct 23, 2024Updated last year
- CTF framework and exploit development library☆13,297Updated this week
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆378Mar 24, 2025Updated 11 months ago
- A curated list of CTF frameworks, libraries, resources and softwares☆11,312Jul 22, 2024Updated last year
- Set of pre-generated pwn.college challenges☆68Jan 24, 2023Updated 3 years ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,820Jun 8, 2019Updated 6 years ago
- kernel-pwn and writeup collection☆700Oct 2, 2023Updated 2 years ago
- A powerful and user-friendly binary analysis platform!☆8,531Updated this week
- Exercises to learn how to fuzz with American Fuzzy Lop☆1,276Oct 12, 2022Updated 3 years ago
- awesome list of browser exploitation tutorials☆2,266Sep 18, 2023Updated 2 years ago
- For Linux binary Exploitation☆845Mar 26, 2018Updated 7 years ago
- GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Li…☆8,038Feb 15, 2026Updated 3 weeks ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,762Apr 3, 2024Updated last year
- A collection of resources for linux reverse engineering☆2,073Jun 2, 2022Updated 3 years ago
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆10,156Mar 2, 2026Updated last week
- Google CTF☆4,911Feb 11, 2026Updated 3 weeks ago
- A Course on Intermediate Level Linux Exploitation☆1,010Aug 24, 2020Updated 5 years ago
- the challenge generation framework for pwn.college☆22Nov 19, 2025Updated 3 months ago
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆13,314Updated this week
- ☆1,106Mar 14, 2024Updated last year
- Kernel development & exploitation practice environment.☆250Sep 10, 2023Updated 2 years ago
- Linux Binary Exploitation☆1,357Jun 15, 2021Updated 4 years ago
- CTF Archives: Collection of CTF Challenges.☆1,381Updated this week
- Perfect Blue's CTF Writeups☆694Jun 24, 2024Updated last year
- A collection of vulnerable ARM binaries for practicing exploit development☆931Nov 15, 2021Updated 4 years ago
- ☆90Jun 15, 2022Updated 3 years ago
- An archive of low-level CTF challenges developed over the years☆653Nov 28, 2021Updated 4 years ago
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆720Oct 19, 2024Updated last year