[标题搜索]只能搜索题目标题,[综合搜索]支持多关键词多项目搜索(以空格分隔)。
| 序号 | Website | Type | Title | Value | Writeup | Competition | Id |
|---|---|---|---|---|---|---|---|
| 1 | bugku | Forensics | Magic | th15_15_b14ck_m4g1k | https://ctftime.org/writeup/27983 | UMDCTF2021 | 2449 |
| 2 | BUUCTF | Reverse | [DASCTF 2023六月挑战赛|二进制专项]careful | DASCTF{03446c2c-dff7-11ed-9285-54e1ad98d649} | https://blog.csdn.net/ULGANOY/article... | DASCTF 2023六月挑战赛|二进制专项 | 6172 |
| 3 | BUUCTF | Real | [Openssh]CVE-2018-15473 | 无 | https://blog.csdn.net/huryer/article/... | Openssh | 7344 |
| 4 | NSSCTF | Reverse | [GKCTF 2021]SoMuchCode | GKCTF{9b34a61df773acf0e4dec25ea5fb0e29} | https://zhuanlan.zhihu.com/p/389178763 | GKCTF | 13252 |
| 5 | BUUCTF | Pwn | pwnable_uaf | pwnable_uaf(即pwnable_hacknote)的解题答案为利用UAF漏洞修改堆块函数指针,最终通过system("/bin/sh")获取shell。验证后的网址为:https://cn-sec.com/archives/2893914.html | https://geekdaxue.co/read/yizhixiaoan... | - | 8535 |
| 6 | NSSCTF | MISC | [NUSTCTF 2022 新生赛]puzzle | flag{1} | https://blog.csdn.net/Jayjay___/artic... | NUSTCTF | 13975 |
| 7 | BUUCTF | Pwn | pwnable_dragon | pwnable_dragon的解题方法为利用整数溢出和UAF漏洞,通过控制龙的血量溢出获胜后修改函数指针获取shell。验证链接为CSDN博客的完整解题过程 2。 无 | https://blog.csdn.net/seaaseesa/artic... | - | 8510 |
| 8 | BUUCTF | Web | [CISCN2019 华东南赛区]Double Secret | 通过RC4加密模板注入payload获取flag | https://www.cnblogs.com/seizer/p/1703... | CISCN2019 华东南赛区 | 6109 |
| 9 | BUUCTF | Web | [N1CTF2020]Zabbix-fun | n1ctf20205bf75ab0a30dfc0c | https://blog.csdn.net/veinard_F/artic... | N1CTF2020 | 7015 |
| 10 | ctfshow | 群友挑战.RealWorldRe | TH185 | ctfshow{ASAHIMARUEFU} | https://www.dr0n.top/posts/37dc4cfa/ | RealWorldRe | 4700 |