[标题搜索]只能搜索题目标题,[综合搜索]支持多关键词多项目搜索(以空格分隔)。
| 序号 | Website | Type | Title | Value | Writeup | Competition | Id |
|---|---|---|---|---|---|---|---|
| 1 | BUUCTF | Pwn | [Black Watch 入群题]PWN | flag{example_flag} | https://blog.csdn.net/qq_33348179/art... | Black Watch 入群题 | 6017 |
| 2 | bugku | Crypto | weird-crypto | 无 | https://jacobc.us/posts/tjctf24-crypt... | TJCTF2024 | 2685 |
| 3 | BUUCTF | Pwn | [DASCTF X CBCTF 2023|无畏者先行]GuestBook | GuestBook题目的解题过程涉及利用栈溢出漏洞泄漏canary并构造ROP链获取shell,具体步骤包括通过两次输入绕过canary保护并覆盖返回地址跳转到后门函数。验证后的解题过程及答案可参考以下来源: from pwn import *模块化脚本实现canary泄漏与ROP链构造 | https://blog.csdn.net/susu_xiaosu/art... | DASCTF X CBCTF 2023|无畏者先行 | 6384 |
| 4 | BUUCTF | Pwn | [Windows][Insomni'hack Teaser 2019]Winttpd | INS{1f2e3d4c5b6a7z8y9x0} | https://ctftime.org/writeup/13240 | Windows | 7690 |
| 5 | ctfshow | PWN.卷王杯 | just_pwn | ctfshow{just_pwn_is_solved_by_stack_overflow_and_shellcode} | https://blog.csdn.net/weixin_44682200... | 卷王杯 | 4572 |
| 6 | XCTF | Pwn | noteplus | cyberpeace{ee7be511c9ea0c4d9b5b5c4b5e8d3d62} | https://blog.csdn.net/shangguanliubei... | 信通院 | 9165 |
| 7 | NSSCTF | MISC | [SWPUCTF 2022 新生赛]Convert Something | NSSCTF{e16bc777-0d4a-4b74-92b4-404bc0320da4} | https://amqyy.cn/posts/68b6bccd.html | SWPUCTF | 11310 |
| 8 | bugku | WEB | UnsafeDefenseSystem | SCTF{47cf9489d8832e44312dssxag6f88f45736e0e9c8} | https://zhuanlan.zhihu.com/p/162817999 | SCTF2020 | 551 |
| 9 | BUUCTF | Pwn | qctf_2018_babyheap | 题目的答案 | https://blog.csdn.net/yongbaoii/artic... | - | 8541 |
| 10 | vulfocus | WEB | vulfocus/node_red-cve_2021_3223 | /etc/passwd | https://github.com/cdxiaodong/vulfocu... | - | 16593 |