[标题搜索]只能搜索题目标题,[综合搜索]支持多关键词多项目搜索(以空格分隔)。
| 序号 | Website | Type | Title | Value | Writeup | Competition | Id |
|---|---|---|---|---|---|---|---|
| 1 | bugku | MISC | Xorua | 无 | https://born2scan.run/writeups/2022/0... | UMDCTF2022 | 906 |
| 2 | XCTF | MISC | 极限反转 | 2/3 | https://zhuanlan.zhihu.com/p/363329033 | - | 9696 |
| 3 | XCTF | Web | comment | flag{49f6d797-63b1-48bc-b492-37dcb3343adf} | https://blog.csdn.net/m0_62107966/art... | 网鼎杯 2018 | 9288 |
| 4 | ctfshow | PWN入门.Bypass安全机制 | pwn123 | flag{execve/open/write/close/munmap/preadv/openat/nfsservctl/getpmsg/pread64/pwrite64} | https://zhuanlan.zhihu.com/p/652884924 | Bypass安全机制 | 4981 |
| 5 | BUUCTF | Reverse | [watevrCTF 2019]Watshell | 12 103 101 116 95 116 104 101 95 102 108 97 103 95 112 108 101 97 115 101 | https://www.cnblogs.com/harmonica11/p... | watevrCTF 2019 | 7662 |
| 6 | bugku | MISC | Spice Harvest Data Recovery | Key Recovery (UMDCTF 2024)的解题过程和答案已通过分析受损RSA密钥的低1024位掩码实现恢复,具体方法涉及解析密钥参数n、d、p、q的已知位并推导缺失值。验证后的完整解题过程及答案可见于: flag{...} | https://imp.ress.me/blog/2024-04-29/u... | UMDCTF2024 | 2479 |
| 7 | NSSCTF | MISC | [BSidesSF 2020]mpfrag | 无 | https://www.cnblogs.com/yunqian2017/p... | BSidesSF | 13618 |
| 8 | ctfshow | WEB入门.命令执行 | web118 | PATH: A{PATH:~A}PATH: A{PWD:~A} ????.??? | https://www.cnblogs.com/aninock/p/156... | 命令执行 | 3370 |
| 9 | NSSCTF | RC4 | [NSSRound#27 Basic]ezminiprograme | NSSCTF{c6e67111c1aadd1bdc4dad6d99c254e7} | https://patr1ck-s.github.io/2025/03/2... | NSSRound#27 | 12407 |
| 10 | NSSCTF | CRYPTO | [HKCERT 2024]RSA LCG (0) | 无 | https://mystiz.hk/posts/2025/2025-06-... | HKCERT | 12663 |