[标题搜索]只能搜索题目标题,[综合搜索]支持多关键词多项目搜索(以空格分隔)。
| 序号 | Website | Type | Title | Value | Writeup | Competition | Id |
|---|---|---|---|---|---|---|---|
| 1 | vulfocus | WEB | youphptube SQL注入 (CVE-2019-5120) | 无 | https://www.clouddefense.ai/cve/2019/... | - | 16574 |
| 2 | CTFHUB | Web | Love Math | $pi=base_convert(37907361743,10,36)(dechex(1598506324));(pi)pi((pi){pi}((pi)pi((pi){cos})&pi=system&cos=cat%20/flag.php | https://blog.csdn.net/weixin_73904941... | CISCN | 9975 |
| 3 | NSSCTF | 密码爆破 | [SWPUCTF 2022 新生赛]Crack Me | NSSCTF{a80e8ac7-2f4a-418e-b81e-a9e15c3c0d28} | https://blog.csdn.net/weixin_46631585... | SWPUCTF | 10938 |
| 4 | CTFHUB | 网鼎杯 | 最好的语言 | flag{ca201ed0-9e07-11e8-b6dd-000c29dcabfd} | https://blog.csdn.net/u010418732/arti... | 网鼎杯 | 10167 |
| 5 | NSSCTF | 动态调试 | [HNCTF 2022 WEEK2]Try2Bebug_Plus | 无 | https://blog.csdn.net/YYueHua5/articl... | HNCTF | 11020 |
| 6 | NSSCTF | 弱比较 | [NSSRound#16 Basic]了解过PHP特性吗 | 无 | https://iamblackcat.com/posts/nssctf_... | NSSRound#16 | 10838 |
| 7 | BUUCTF | Pwn | hitcontraining_magicheap | hitcontraining_magicheap的解题过程通过unsorted bin attack覆盖magic值实现get shell,关键步骤包括创建三个chunk、利用堆溢出修改bk指针、触发unsorted bin脱链操作写入magic值,最终输入4869触发后门 1 3。验证后的网址为:https://blog.csdn.net/mcmuyanga/article/details/112302849 | https://blog.csdn.net/zwb2603096342/a... | - | 8329 |
| 8 | BUUCTF | Web | [极客大挑战 2019]PHP | flag{b18bb0c2-8084-4e65-a402-f1803a87f80d} | https://blog.csdn.net/rumil/article/d... | 极客大挑战 2019 | 7947 |
| 9 | NSSCTF | 古典密码 | [柏鹭杯 2021]据说有些数据可以进行多重编码? | flag{ISEC-42115cad00f8c4a0495bffa97d2ca3a8} | https://zhuanlan.zhihu.com/p/42813548... | 柏鹭杯 | 11248 |
| 10 | XCTF | MISC | challenge_how_many_Vigenère | LCTF{osqjdcsvzjxfkoutsvdmoqcegnqc} | https://blog.csdn.net/weixin_44604541... | CTF | 9006 |