萌新的v8之旅(二)
-
xnuca2020-babyV8
第一次v8之旅
-
WangDing-2024
这是一次十分成功的公费旅游
-
miniL-2024
miniL-2024Pwn2bytesjmp 短跳 1234567891011121314151617181920212223242526272829303132333435363738from pwncli import *context.terminal = ["tmux", "splitw", "-h", "-l&q... -
ciscn-2024
先贴个exp,有空补充详细 gostack123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687from pwncli... -
PCTF-wp
PCTF-WPinkeyWebSign In开靶机,通过chrome的开发者工具找到了flag Reverse学ida与化学gdb把程序拖入ida中即可找到flag baby_python再异或一次即可得到原文 12345678import base64a = 'v|qwk@idx_~O!cObuq!!)Oy~dubucdY~w!i111m'b = []for i in ... -
abstract_shellcode
abstract_shellcodechecksec一下 12345678Arch: amd64-64-little RELRO: Full RELRO Stack: Canary found NX: NX unknown - GNU_STACK missing PIE: PIE enabled Stack: Executa... -
年轻人的第一条博客
Hello World!小菜鸡的pwn之旅