[随波逐流]CTF Flags

软件版本:v1.0.0   数据版本: v20260201
序号 Website Type Title Value Writeup Competition Id
1 bugku PWN lazynote SECCON2020 lazynote的解题核心是利用FSOP(File Structure Overwrite Protection)漏洞,通过伪造IO_FILE结构体实现任意地址写入和libc地址泄露,最终通过one-gadget获取shell。 https://faraz.faith/2020-10-13-FSOP-lazynote/ SECCON2020 2123
2 NSSCTF REVERSE [SWPUCTF 2024 秋季新生赛]不是,哥们,还有签到? https://blog.csdn.net/lionkas/article... SWPUCTF 11545
3 NSSCTF 文件上传 [UUCTF 2022 新生赛]uploadandinject https://blog.csdn.net/LDdfq/article/d... UUCTF 11297
4 xuenixiang.com Reverse ezmath http://www.qfrost.com/posts/ctf/%E5%B... 强网杯qwb_2021 15562
5 BUUCTF Misc [NPUCTF2020]OI的梦 flag{calendar} https://www.cnblogs.com/vict0r/p/1356... NPUCTF2020 7321
6 ctfshow PWN.1024杯 1024_happy_checkin 1024_happy_checkin http://www.ericdshen.com/index.php/ar... 1024杯 3424
7 bugku MISC Linux2 KEY{BraveIsTheKey} https://blog.csdn.net/mijiandawang/ar... bugku 93
8 XCTF MISC 神奇的Modbus sctf{Easy_Modbus} https://www.cnblogs.com/LY613313/p/16... XCTF 8961
9 NSSCTF CRYPTO [NSSRound#6 Team]binary(V2) NSSCTF{a974e2f02002874825ab6e8123eaef42} https://mrl64.github.io/2022/10/16/%E... NSSRound#6 12341
10 bugku PWN Tr*vial gigem{tr1v1a1_tr1v1a1_tr1v1a1_4r3_w3_th3r3_y3t} https://ctf.bugku.com/challenges/deta... TAMUctf2022 779