[随波逐流]CTF Flags

软件版本:v1.0.0   数据版本: v20260201
序号 Website Type Title Value Writeup Competition Id
1 NSSCTF 内存取证 [OtterCTF 2018]Graphic's For The Weak NSSCTF{S0_Just_M0v3_Socy} https://www.cnblogs.com/carefree669/p... OtterCTF 11125
2 BUUCTF Pwn ciscn2018_echo_back https://blog.csdn.net/weixin_52640415... - 8216
3 ctfshow REVERSE.吃鸡杯 EzAutoRE ctfshow{y0u_g0t_t4e_5ecret} https://blog.wjhwjhn.com/posts/ctfsho... 吃鸡杯 4165
4 BUUCTF Pwn [VNCTF2023]鼠鼠的奇妙冒险 flag{2a7acb80-e2d6-4698-b33e-7833a4f7564c} https://www.seaeye.cn/archives/497.html VNCTF2023 7639
5 NSSCTF 古典密码 [BJDCTF 2020]伏羲六十四卦 flag{bjdcongratulationsongettingtheflag} https://blog.csdn.net/m0_66879478/art... BJDCTF 11648
6 xuenixiang.com Misc 灭霸来了 - https://www.xuenixiang.com/forum.php?... 吉林省第二届CTF初赛 15053
7 bugku Reverse week2_re1 https://f4y3.icu/2022/10/0xgame2022-w... 0xGame2022 765
8 BUUCTF Pwn fixedpoint_plaid_2016 https://duksctf.github.io/2016/04/18/... - 8280
9 BUUCTF Pwn [DASCTF X CBCTF 2023|无畏者先行]GuestBook GuestBook题目的解题过程涉及利用栈溢出漏洞泄漏canary并构造ROP链获取shell,具体步骤包括通过两次输入绕过canary保护并覆盖返回地址跳转到后门函数。验证后的解题过程及答案可参考以下来源: from pwn import *模块化脚本实现canary泄漏与ROP链构造 https://blog.csdn.net/susu_xiaosu/art... DASCTF X CBCTF 2023|无畏者先行 6384
10 ctfshow CRYPTO.内部赛 签到 ctfshow{27b8116b-32d8-4b38-8747-ecaaebbdf87a} https://blog.csdn.net/HAI_WD/article/... 内部赛 3108