diff --git a/README.md b/README.md index 20ea606..e7038f9 100644 --- a/README.md +++ b/README.md @@ -313,6 +313,7 @@ Check solve section for steganography. *Always online CTFs* - [Backdoor](https://backdoor.sdslabs.co/) - Security Platform by SDSLabs. +- [Crackmes](https://crackmes.one/) - Reverse Engineering Challenges - [Ctfs.me](http://ctfs.me) - CTF All the time - [Exploit Exercises](https://exploit-exercises.com/) - Variety of VMs to learn variety of computer security issues. - [Gracker](http://gracker.org) - Binary challenges having a slow learning curve, and write-ups for each level. @@ -325,6 +326,7 @@ Check solve section for steganography. - [Over The Wire](http://overthewire.org/wargames/) - Wargame maintained by OvertheWire Community - [Pwnable.kr](http://pwnable.kr/) - Pwn Game - [Pwnable.tw](https://pwnable.tw/) - Binary wargame +- [Pwnable.xyz](https://pwnable.xyz/) - Binary Exploitation Wargame - [Reversin.kr](http://reversing.kr/) - Reversing challenge - [Ringzer0Team](https://ringzer0team.com/) - Ringzer0 Team Online CTF - [Root-Me](https://www.root-me.org/) - Hacking and Information Security learning platform.