List of security challenges

At the moment, it’s a bit complicate to gather the team to work on CTFs, therefore, I started to look for offline (i.e. non-CTF) security challenges, and I found a list of interesting resources:

I will try to keep this list up to date with interesting resource for security exercises.

In the next articles, I will have a closer look at the VM Protostar from Exploit Exercises.