PwnLand is an open-source repository maintained by PwnFuzz, an R&D lab specializing in fuzzing, reverse engineering, vulnerability research, and exploit development. This repository serves as a comprehensive resource for security researchers, CTF players, and anyone interested in binary exploitation.
PwnLand contains practical examples, tutorials, CTF writeups, and research materials covering various aspects of binary exploitation, including:
Whether you’re a beginner or an experienced security researcher, PwnLand provides hands-on materials to enhance your understanding of exploitation techniques across different environments and security mechanisms.
.
├── Assembly/ # Assembly language fundamentals
├── Attachments/ # Supporting images and resources
├── binaries/ # Example binaries for practice
├── BufferOverflows/ # Buffer overflow techniques and examples
├── Challenges/ # Practice challenges
├── CTFs/ # Writeups and solutions for CTF challenges
├── Debugging/ # Debugging techniques and guides
├── Format String/ # Format string vulnerability tutorials
├── Heap/ # Heap exploitation techniques
├── Kernel/ # Kernel exploitation examples
└── Research/ # Deep dives into exploitation concepts
Navigate to BufferOverflows/ to explore:
Navigate to Format String/ to learn about:
Navigate to Heap/ for techniques organized by GLIBC version:
Navigate to Kernel/ to explore:
This section was contributed by Nikhil. The following blog posts are beginner-friendly and offer in-depth guidance for those starting out with Windows kernel exploitation on modern systems.
Explore solutions from various CTF competitions:
Navigate to Research/ for deep dives into:
Navigate to Assembly/ for:
Navigate to Debugging/ for:
Navigate to Challenges/ to test your skills:
To get started with PwnLand:
git clone https://github.com/PwnFuzz/PwnLand.git
Browse to a topic of interest in the repository.
Follow the tutorials and examples to enhance your skills.
Contributions to PwnLand are welcome! Whether you want to fix a typo, add a tutorial, or contribute a CTF writeup, please follow these steps:
git checkout -b feature/your-feature
)git commit -am 'Add new tutorial on XYZ'
)git push origin feature/your-feature
)Please ensure your contributions follow the existing structure and include appropriate documentation.
This project is licensed under the MIT License - see the LICENSE file for details.
© 2025 PwnFuzz - Open Source R&D Lab for Fuzzing, Reverse Engineering, Vulnerability Research & Exploit Development