Skip to content

i am sharing my process leaning cybersecurity and binary exploitation using pwn college

Notifications You must be signed in to change notification settings

Dhiasaid/pwn.college

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

29 Commits
 
 
 
 
 
 
 
 

Repository files navigation

pwncollege 🎓💻

Welcome to the pwncollege repository! This repo is dedicated to providing solutions for the challenges on pwn.college. I will be sharing my progress and solutions, with the hope that they remain available for educational purposes. All challenges come with their respective solvers. 💡

Overview 🌟

This repository includes solutions for various challenges from pwn.college, a platform for learning about security, programming, and exploitation. The main focus is to help you get started and progress through different dojo challenges.

Challenges Included 🏆

I’ve managed to make significant progress in the following dojos:

  • Getting Started:

    • Challenges: 0/10
    • Learn the basics of security and exploitation. 🚀
  • Linux Luminarium:

    • Challenges: 82/82
    • Explore Linux-specific challenges and vulnerabilities. 🐧
  • Computing 101:

    • Challenges: 69/69
    • A beginner-friendly set of challenges focusing on fundamental computing concepts. 🖥️
  • Playing with Programs:

    • Challenges: 84/255
    • A wide range of challenges related to reverse engineering, buffer overflows, and more. 🛠️
  • Intro to Cybersecurity:

    • Challenges: 0/155
    • Dive into the core principles of cybersecurity. 🔐
  • Program Security:

    • Challenges: 0/161
    • Learn about securing software and defending against vulnerabilities. 💪
  • System Security:

    • Challenges: 0/95
    • Focus on securing systems, services, and networks. 🔧
  • Software Exploitation:

    • Challenges: 0/104
    • Study how to exploit software vulnerabilities. 💥

How to Get Started 🚀

  1. Clone this repository:

    git clone https://github.com/Dhiasaid/pwn.college.git
  2. Navigate to the challenge directory: Each dojo has its own directory, and each challenge within will have its own solution folder.

  3. Follow the instructions: For each challenge, there will be an explanation of how to solve it and the code or commands used.

  4. Contribute: If you have solved a challenge or have improvements to share, feel free to create a pull request! 🤝

Progress Tracking 📊

You can track my progress as I continue to work through the challenges. For now, I have completed the following:

  • Getting Started: 0/10
  • Linux Luminarium: 82/82
  • Computing 101: 69/69
  • Playing with Programs: 84/255
  • Intro to Cybersecurity: 0/155
  • Program Security: 0/161
  • System Security: 0/95
  • Software Exploitation: 0/104

Disclaimer ⚠️

Please note that these solutions are provided for educational purposes only. By working through these challenges, you can learn how to identify and exploit vulnerabilities in various types of software. Remember to always act responsibly and legally when it comes to security testing. 🔒


I hope this helps you on your journey to learning security and exploitation. If you have any questions or need further assistance, feel free to open an issue or contribute to the repository.

Good luck, and happy hacking! 👾🖤

About

i am sharing my process leaning cybersecurity and binary exploitation using pwn college

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published