[标题搜索]只能搜索题目标题,[综合搜索]支持多关键词多项目搜索(以空格分隔)。
| 序号 | Website | Type | Title | Value | Writeup | Competition | Id |
|---|---|---|---|---|---|---|---|
| 1 | BUUCTF | Crypto | [WUSTCTF2020]佛说:只能四天 | flag{ni_hao_xiang_xiang_da_wo} | https://www.cnblogs.com/mumuhhh/artic... | WUSTCTF2020 | 7736 |
| 2 | NSSCTF | CRYPTO | [CryptoCTF 2021]LINDA | 无 | https://crypto-writeup-public.hatenab... | CryptoCTF | 13563 |
| 3 | bugku | Reverse | Petition | flag{Petition_Unicorn_Bypass} | https://blog.csdn.net/m0_48218081/art... | 鹤城杯2021 | 1657 |
| 4 | BUUCTF | Web | [RWCTF2018]Bookhub | 1、根据搜索资料,题目有四个主要考点:信息搜集(通过后台登录白名单IP限制泄露外网IP,并扫描发现debug模式的端口)、Flask装饰器顺序问题(@login_required需放在@route内层才有效)、redis eval注入(debug模式下清空其他session时存在Lua代码注入)以及反序列化(通过注入session触发Python反序列化执行命令) 2。最终可利用这些漏洞组合实现任意命令执行。 | https://cloud.tencent.com/developer/a... | RWCTF2018 | 7418 |
| 5 | ctfshow | PWN入门.Kernel-PWN | pwn356 | 无 | https://blog.csdn.net/KaliLinux_V/art... | Kernel-PWN | 5284 |
| 6 | bugku | MISC | Toxic | CatCTF{rabbit_91_catflag} | https://zhuanlan.zhihu.com/p/666747354 | MidnightFlag2021 | 1458 |
| 7 | NSSCTF | RC4 | [SWPUCTF 2021 新生赛]PYRE | NSSCTF{more_qwq_lol} | https://blog.csdn.net/lzx13290757580/... | SWPUCTF | 11009 |
| 8 | ctfshow | PWN.36D杯 | 签到 | flag{keyboard_enc} | https://www.cnblogs.com/mumuhhh/p/178... | 36D杯 | 3164 |
| 9 | CTFHUB | Pwn | babyheap | 无 | https://blog.csdn.net/qq_41071646/art... | 0CTF | 10054 |
| 10 | bugku | Crypto | RSA | flag{Wien3r_4tt@ck_1s_3AsY} | https://blog.csdn.net/am_03/article/d... | n00bzCTF2022 | 2177 |