0ctf_2024
是什么比赛只有一个纯血pwn呢?哎呀好难猜
ciscn-2025-初赛
顶级战犯,不会二叉树的fw,如果我是数据结构之神的话………………
强网S8-final-JP
差点二等,非常可惜,来年再战
PlaidCTF-roll-a-d8
萌新的v8之旅(二)
xnuca2020-babyV8
第一次v8之旅
WangDing-2024
这是一次十分成功的公费旅游
miniL-2024
miniL-2024Pwn2bytesjmp 短跳 1234567891011121314151617181920212223242526272829303132333435363738from pwncli import *context.terminal = ["tmux", "splitw", "-h", "-l", "122"]if 1: addr = '172.23.32.1:41845' host =...
ciscn-2024
先贴个exp,有空补充详细 gostack123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687from pwncli import *context.terminal = ["tmux", "splitw", "-h", "-l",...
PCTF-wp
PCTF-WPinkeyWebSign In开靶机,通过chrome的开发者工具找到了flag Reverse学ida与化学gdb把程序拖入ida中即可找到flag baby_python再异或一次即可得到原文 12345678import base64a = 'v|qwk@idx_~O!cObuq!!)Oy~dubucdY~w!i111m'b = []for i in a: b.append(chr(ord(i) ^ 0x10))b = "".join(b)print(b) xor也是再异或一次出flag 123enc =...
abstract_shellcode
abstract_shellcodechecksec一下 12345678Arch: amd64-64-little RELRO: Full RELRO Stack: Canary found NX: NX unknown - GNU_STACK missing PIE: PIE enabled Stack: Executable RWX: Has RWX...