Skip to content

Curated knowledge base of exploitation techniques, reverse engineering workflows, and fuzzing insights — built for repeatable, real-world offensive research.

License

Notifications You must be signed in to change notification settings

pwnfuzz/PwnLand

Repository files navigation

PwnLand

PwnFuzz Focus License

Overview

PwnLand is an open-source repository maintained by PwnFuzz, an R&D lab specializing in fuzzing, reverse engineering, vulnerability research, and exploit development. This repository serves as a comprehensive resource for security researchers, CTF players, and anyone interested in binary exploitation.

PwnLand contains practical examples, tutorials, CTF writeups, and research materials covering various aspects of binary exploitation, including:

  • Buffer Overflows and ROP Chains
  • Format String Vulnerabilities
  • Heap Exploitation Techniques
  • Kernel Exploitation
  • Assembly Language Fundamentals
  • Binary Debugging Strategies

Whether you're a beginner or an experienced security researcher, PwnLand provides hands-on materials to enhance your understanding of exploitation techniques across different environments and security mechanisms.

Table of Contents

Directory Structure

.
├── Assembly/              # Assembly language fundamentals
├── Attachments/           # Supporting images and resources
├── binaries/              # Example binaries for practice
├── BufferOverflows/       # Buffer overflow techniques and examples
├── Challenges/            # Practice challenges
├── CTFs/                  # Writeups and solutions for CTF challenges
├── Debugging/             # Debugging techniques and guides
├── Format String/         # Format string vulnerability tutorials
├── Heap/                  # Heap exploitation techniques
├── Kernel/                # Kernel exploitation examples
└── Research/              # Deep dives into exploitation concepts

Exploitation Techniques

Buffer Overflows

Navigate to BufferOverflows/ to explore:

Format String

Navigate to Format String/ to learn about:

Heap Exploitation

Navigate to Heap/ for techniques organized by GLIBC version:

Kernel Exploitation

Navigate to Kernel/ to explore:

Kernel Exploitation Primer Series

This section was contributed by Nikhil. The following blog posts are beginner-friendly and offer in-depth guidance for those starting out with Windows kernel exploitation on modern systems.

CTF Writeups

Explore solutions from various CTF competitions:

Research Materials

Navigate to Research/ for deep dives into:

Assembly Resources

Navigate to Assembly/ for:

Debugging Guides

Navigate to Debugging/ for:

Challenges

Navigate to Challenges/ to test your skills:

Getting Started

To get started with PwnLand:

  1. Clone this repository:

    git clone https://github.com/PwnFuzz/PwnLand.git
  2. Browse to a topic of interest in the repository.

  3. Follow the tutorials and examples to enhance your skills.

  4. For binary examples, navigate to the binaries/ directory.

Contributing

Contributions to PwnLand are welcome! Whether you want to fix a typo, add a tutorial, or contribute a CTF writeup, please follow these steps:

  1. Fork the repository
  2. Create a new branch (git checkout -b feature/your-feature)
  3. Commit your changes (git commit -am 'Add new tutorial on XYZ')
  4. Push to the branch (git push origin feature/your-feature)
  5. Create a new Pull Request

Please ensure your contributions follow the existing structure and include appropriate documentation.

License

This project is licensed under the MIT License - see the LICENSE file for details.


© 2025 PwnFuzz - Open Source R&D Lab for Fuzzing, Reverse Engineering, Vulnerability Research & Exploit Development

About

Curated knowledge base of exploitation techniques, reverse engineering workflows, and fuzzing insights — built for repeatable, real-world offensive research.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published