User Tools

Site Tools


cybersecurity

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
cybersecurity [2025/09/03 14:25] admincybersecurity [2025/09/04 13:41] (current) admin
Line 11: Line 11:
   * [[https://cryptopals.com/|the cryptopals crypto challenges]]   * [[https://cryptopals.com/|the cryptopals crypto challenges]]
   * [[https://github.com/antonio-morales/Fuzzing101|Fuzzing 101]]   * [[https://github.com/antonio-morales/Fuzzing101|Fuzzing 101]]
 +  * [[https://guyinatuxedo.github.io/|Nightmare]] - intro to binay exploitation
  
 Training Training
Line 16: Line 17:
   * [[https://vvmlist.github.io/|vvmlist]] - list of vulnerable virtual machines (meant for training) with tags and difficulty   * [[https://vvmlist.github.io/|vvmlist]] - list of vulnerable virtual machines (meant for training) with tags and difficulty
   * [[https://pwnable.kr/index.php|pwnable.kr]] - binary exploitation challenges   * [[https://pwnable.kr/index.php|pwnable.kr]] - binary exploitation challenges
 +  * [[https://github.com/hacksysteam/HackSysExtremeVulnerableDriver]]
 +  * [[https://crackmes.one/]]
 +  * [[https://www.smashthestack.org/]]
 +  * [[https://io.netgarage.org/]]
 +  * [[https://archive.ooo/|archive.ooo]] - archived challenges from DEFCON
  
 Wordlists Wordlists
cybersecurity.txt · Last modified: by admin

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki