Welcome to the pwncollege repository! This repo is dedicated to providing solutions for the challenges on pwn.college. I will be sharing my progress and solutions, with the hope that they remain available for educational purposes. All challenges come with their respective solvers. 💡
This repository includes solutions for various challenges from pwn.college, a platform for learning about security, programming, and exploitation. The main focus is to help you get started and progress through different dojo challenges.
I’ve managed to make significant progress in the following dojos:
-
Getting Started:
- Challenges: 0/10
- Learn the basics of security and exploitation. 🚀
-
Linux Luminarium:
- Challenges: 82/82
- Explore Linux-specific challenges and vulnerabilities. 🐧
-
Computing 101:
- Challenges: 69/69
- A beginner-friendly set of challenges focusing on fundamental computing concepts. 🖥️
-
Playing with Programs:
- Challenges: 84/255
- A wide range of challenges related to reverse engineering, buffer overflows, and more. 🛠️
-
Intro to Cybersecurity:
- Challenges: 0/155
- Dive into the core principles of cybersecurity. 🔐
-
Program Security:
- Challenges: 0/161
- Learn about securing software and defending against vulnerabilities. 💪
-
System Security:
- Challenges: 0/95
- Focus on securing systems, services, and networks. 🔧
-
Software Exploitation:
- Challenges: 0/104
- Study how to exploit software vulnerabilities. 💥
-
Clone this repository:
git clone https://github.com/Dhiasaid/pwn.college.git
-
Navigate to the challenge directory: Each dojo has its own directory, and each challenge within will have its own solution folder.
-
Follow the instructions: For each challenge, there will be an explanation of how to solve it and the code or commands used.
-
Contribute: If you have solved a challenge or have improvements to share, feel free to create a pull request! 🤝
You can track my progress as I continue to work through the challenges. For now, I have completed the following:
- Getting Started: 0/10
- Linux Luminarium: 82/82
- Computing 101: 69/69
- Playing with Programs: 84/255
- Intro to Cybersecurity: 0/155
- Program Security: 0/161
- System Security: 0/95
- Software Exploitation: 0/104
Please note that these solutions are provided for educational purposes only. By working through these challenges, you can learn how to identify and exploit vulnerabilities in various types of software. Remember to always act responsibly and legally when it comes to security testing. 🔒
I hope this helps you on your journey to learning security and exploitation. If you have any questions or need further assistance, feel free to open an issue or contribute to the repository.
Good luck, and happy hacking! 👾🖤