[标题搜索]只能搜索题目标题,[综合搜索]支持多关键词多项目搜索(以空格分隔)。
| 序号 | Website | Type | Title | Value | Writeup | Competition | Id |
|---|---|---|---|---|---|---|---|
| 1 | BUUCTF | Pwn | sleepyHolder_hitcon_2016 | 无 | https://blog.csdn.net/zzq487782568/ar... | - | 8646 |
| 2 | BUUCTF | Crypto | [BJDCTF 2nd]老文盲了 | BJD{淛匶襫黼瀬鎶軄鶛驕鳓哵} | https://blog.csdn.net/qq_51558360/art... | BJDCTF 2nd | 5983 |
| 3 | ctfshow | MISC | 超级玛丽 | Flag{SUPERDALAO} | https://blog.csdn.net/m0_68012373/art... | - | 3042 |
| 4 | ctfshow | WEB | web9 | flag{vim_swap_file_recovery} | https://www.cnblogs.com/Athena-ydy/p/... | - | 2959 |
| 5 | 春秋云境 | WEB | CVE-2022-25759 | ZG9jdW1lbnQud3JpdGUoJzxzdmctZHVtbXk+PC9zdmctZHVtbXk+PGlmcmFtZSBzcmM9ImZpbGU6Ly8vZXRjL3Bhc3N3ZCIgd2lkdGg9IjEwMCUiIGhlaWdodD0iMTAwMHB4Ij48L2lmcmFtZT48c3ZnIHZpZXdCb3g9IjAgMCAyNDAgODAiIGhlaWdodD0iMTAwMCIgd2lkdGg9IjEwMDAiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2ZyI+PHRleHQgeD0iMCIgeT0iMCIgY2xhc3M9IlJycnJyIiBpZD0iZGVtbyI+ZGF0YTwvdGV4dD48L3N2Zz4nKTs= | https://www.smal1.black/CVE%E5%A4%8D%... | 春秋云境 | 14576 |
| 6 | BUUCTF | Reverse | [DASCTF X GFCTF 2024|四月开启第一局]unwind | 无 | https://jishuzhan.net/article/1810210... | DASCTF X GFCTF 2024|四月开启第一局 | 6431 |
| 7 | ctfshow | 电子取证 | 套的签到题 | ctfshow{p4rt1_y00_you_crack_my_wpweb_now_you_can_submit_flag2_oh_you_got_the_part_3} | https://blog.csdn.net/SENMINGya/artic... | - | 4487 |
| 8 | NSSCTF | 随机数预测 | [HNCTF 2022 WEEK4]random | NSSCTF{Every_Mersenne_prime_corresponds_2_exactly_1_perfect_number} | https://blog.csdn.net/luochen2436/art... | HNCTF | 11553 |
| 9 | XCTF | Pwn | 1000levevls | 1000levevls的解题核心是利用vsyscall固定地址滑过栈并触发one-gadget,关键步骤包括:1)通过hint函数将system地址写入栈;2)构造0x38字节填充+p64(vsyscall)*3的payload覆盖返回地址;3)通过99次正确计算后发送payload触发漏洞 2 3 | ... | XCTF | 9152 |
| 10 | CTFHUB | 工业控制(ICS) | S7协议恶意攻击分析 | flag{3201414d} | https://blog.csdn.net/qq_61993117/art... | 之江杯 | 9744 |