[标题搜索]只能搜索题目标题,[综合搜索]支持多关键词多项目搜索(以空格分隔)。
| 序号 | Website | Type | Title | Value | Writeup | Competition | Id |
|---|---|---|---|---|---|---|---|
| 1 | BUUCTF | Crypto | [ACTF新生赛2020]crypto-aes | actf{W0W_y0u_can_so1v3_AES_now!} | https://blog.csdn.net/qq_46089119/art... | ACTF新生赛2020 | 5875 |
| 2 | XCTF | Reverse | handcrafted-pyc | hitcon{Now you can compile and run Python bytecode in your brain!} | https://blog.csdn.net/weixin_45055269... | HITCON | 9390 |
| 3 | bugku | MISC | 半决赛-APK分析.5 | ansjk.ecxeio.xyz | https://blog.csdn.net/2202_75317918/a... | 蓝帽杯2022 | 1370 |
| 4 | BUUCTF | Pwn | hitcontraining_magicheap | hitcontraining_magicheap的解题过程通过unsorted bin attack覆盖magic值实现get shell,关键步骤包括创建三个chunk、利用堆溢出修改bk指针、触发unsorted bin脱链操作写入magic值,最终输入4869触发后门 1 3。验证后的网址为:https://blog.csdn.net/mcmuyanga/article/details/112302849 | https://blog.csdn.net/zwb2603096342/a... | - | 8329 |
| 5 | NSSCTF | ret2libc | [HNCTF 2022 Week1]ezr0p64 | 无 | https://blog.csdn.net/m0_64174759/art... | HNCTF | 10713 |
| 6 | BUUCTF | Misc | [HDCTF2019]你能发现什么蛛丝马迹吗 | flag{F0uNd_s0m3th1ng_1n_M3mory} | https://blog.csdn.net/mochu7777777/ar... | HDCTF2019 | 6850 |
| 7 | ctfshow | MISC.F5杯 | GoodNight | GoodNight | https://paper.vulsee.com/ctf-pdf/ctfs... | F5杯 | 3874 |
| 8 | NSSCTF | StackSmash | [HNCTF 2022 WEEK3]smash | 无 | https://tamoly.github.io/2025/07/29/N... | HNCTF | 11334 |
| 9 | BUUCTF | Misc | [DASCTF Apr.2023 X SU战队2023开局之战]【困难】云 | flag{niceubrokenthecipher} | https://blog.csdn.net/m0_73725283/art... | DASCTF Apr.2023 X SU战队2023开局之战 | 6253 |
| 10 | NSSCTF | MISC | [GoogleCTF 2017 quals]Anonymous exchange | CTF{7h3_b4nk_w4s_pr0ud_0f_1ts_f3d3r4lly_1nsur3d_d3p0s1ts} | https://ctftime.org/writeup/6875 | GoogleCTF | 13930 |