[标题搜索]只能搜索题目标题,[综合搜索]支持多关键词多项目搜索(以空格分隔)。
| 序号 | Website | Type | Title | Value | Writeup | Competition | Id |
|---|---|---|---|---|---|---|---|
| 1 | bugku | MISC | Push and Pickle | Push and Pickle无是构造一个绕过opcode检查的pickle payload,利用__reduce__方法触发check_flag函数。验证后的网址为: https://medium.com/@harryfyx/writeup-uiuctf-2024-push-and-pickle-cf821c49194f | 该文章详细描述了通过修改pickle协议版本和指令流,使用未被禁止的op... | UIUCTF2024 | 2419 |
| 2 | NSSCTF | MISC | [D3CTF 2019]vera | D3CTF{VeraCrypt_ISBN_13_digits_password} | https://www.anquanke.com/post/id/193939 | D3CTF | 13078 |
| 3 | NSSCTF | CRYPTO | [CryptoCTF 2021]Rima | CCTF{_how_finD_7h1s_1z_s3cr3T?!} | https://ctftime.org/writeup/29480 | CryptoCTF | 13312 |
| 4 | qsnctf | WEB | EasyMD5 | qsnctf{4682792f556a4b19afb4eacc6f2dd0c6} | https://fanllspd.com/posts/14e77824/ | 原创题 | 5504 |
| 5 | qsnctf | WEB | baby rce | SQCTF{e1d9e70dd5ca4689b4ab4cd9f4bafc26} | https://blog.csdn.net/weixin_52040570... | 第四届商师校赛 | 5525 |
| 6 | BUUCTF | Crypto | [V&N2020 公开赛]Fast | 题目的答案 | https://blog.csdn.net/weixin_44017838... | V&N2020 公开赛 | 7547 |
| 7 | NSSCTF | MISC | [强网拟态 2022]secret_log | flag{lfxWrTfILF5cdfxpUMvg9L7AbrQxC148} | https://www.secpulse.com/archives/190801.html | 强网拟态 | 13976 |
| 8 | cyberstrikelab | 目录遍历漏洞 | CVE-2019-5418 | CVE-2019-5418的漏洞答案为:通过构造路径穿越攻击(如../../../../etc/passwd{{)利用Ruby on Rails框架的render file参数解析缺陷,实现任意文件读取。验证后的网址为:https://www.cnblogs.com/Found404/p/14430016.html | https://www.yisu.com/jc/500010.html | cyberstrikelab | 16979 |
| 9 | qsnctf | 应急专项 | 应急响应2-29 | - | https://blog.csdn.net/2303_80857229/a... | 第二届“Parloo”CTF应急响应挑战赛 | 5683 |
| 10 | NSSCTF | ORW | [NSSRound#9 Basic]MyMem | [NSSCTF{86ed1ea3-aa00-455a-82a5-80fbd14876ee}] | https://blog.csdn.net/2401_88087539/a... | NSSRound#9 | 11265 |