[标题搜索]只能搜索题目标题,[综合搜索]支持多关键词多项目搜索(以空格分隔)。
| 序号 | Website | Type | Title | Value | Writeup | Competition | Id |
|---|---|---|---|---|---|---|---|
| 1 | bugku | PWN | lazynote | SECCON2020 lazynote的解题核心是利用FSOP(File Structure Overwrite Protection)漏洞,通过伪造IO_FILE结构体实现任意地址写入和libc地址泄露,最终通过one-gadget获取shell。 | https://faraz.faith/2020-10-13-FSOP-lazynote/ | SECCON2020 | 2123 |
| 2 | NSSCTF | REVERSE | [SWPUCTF 2024 秋季新生赛]不是,哥们,还有签到? | 无 | https://blog.csdn.net/lionkas/article... | SWPUCTF | 11545 |
| 3 | NSSCTF | 文件上传 | [UUCTF 2022 新生赛]uploadandinject | 无 | https://blog.csdn.net/LDdfq/article/d... | UUCTF | 11297 |
| 4 | xuenixiang.com | Reverse | ezmath | 无 | http://www.qfrost.com/posts/ctf/%E5%B... | 强网杯qwb_2021 | 15562 |
| 5 | BUUCTF | Misc | [NPUCTF2020]OI的梦 | flag{calendar} | https://www.cnblogs.com/vict0r/p/1356... | NPUCTF2020 | 7321 |
| 6 | ctfshow | PWN.1024杯 | 1024_happy_checkin | 1024_happy_checkin | http://www.ericdshen.com/index.php/ar... | 1024杯 | 3424 |
| 7 | bugku | MISC | Linux2 | KEY{BraveIsTheKey} | https://blog.csdn.net/mijiandawang/ar... | bugku | 93 |
| 8 | XCTF | MISC | 神奇的Modbus | sctf{Easy_Modbus} | https://www.cnblogs.com/LY613313/p/16... | XCTF | 8961 |
| 9 | NSSCTF | CRYPTO | [NSSRound#6 Team]binary(V2) | NSSCTF{a974e2f02002874825ab6e8123eaef42} | https://mrl64.github.io/2022/10/16/%E... | NSSRound#6 | 12341 |
| 10 | bugku | PWN | Tr*vial | gigem{tr1v1a1_tr1v1a1_tr1v1a1_4r3_w3_th3r3_y3t} | https://ctf.bugku.com/challenges/deta... | TAMUctf2022 | 779 |