• 踩坑日记+环境配置

    Fiddler everywhere破解参考: https://mp.weixin.qq.com/s/E-fM9HQX0lZbrBlGr9NouQ https://wwyb.lanzoum.com/ia7B90py2lud //...
  • Confluence CVE-2022-26134

    Confluence CVE-2022-26134 漏洞分析【远程调试学习】https://www.yuque.com/tianxiadamutou/zcfd4v/gil3uc https://github.com/vulhub/vulhub/tre...
  • CISCN 2019东北-PWN2

    [CISCN 2019东北]PWN2https://www.nssctf.cn/problem/95 12345678910111213141516171819202122232425262728293031323334353637383940414...
  • ret2syscall

    ret2syscallhttps://www.cnblogs.com/Junglezt/p/18225810 //64 https://uuzdaisuki.com/2020/02/25/%E6%A0%88%E6%BA%A2%E5...
  • ret2shellcode

    ret2shellcodehttps://uuzdaisuki.com/2020/02/24/%E6%A0%88%E6%BA%A2%E5%87%BA%E4%B9%8Bret2shellcode/ http://www.mi1k7ea.com/2019...
  • ret2text

    ret2texthttps://blog.csdn.net/m0_64815693/article/details/129201282?spm=1001.2014.3001.5502 123456789101112131415161718192021...
  • Canary保护机制及绕过

    Canary保护机制及绕过https://blog.csdn.net/m0_64815693/article/details/129188665?spm=1001.2014.3001.5502 https://www.freebuf.com/arti...
  • 栈溢出分析

    栈溢出例子详细分析123456789101112131415#include<stdio.h>void exploit(){ system("/bin/sh");}void func()...
  • 手搓zip解码器

    zlib.decompress()Referencehttps://pyokagan.name/blog/2019-10-18-zlibinflate/ //文档 https://zhidao.baidu.com/questio...
  • D3CTF_d3pythonhttp

    d3pythonhttpd3参考https://mp.weixin.qq.com/s/AEF9469H7T_J9J3C3JvWvA https://blog.wm-team.cn/index.php/archives/75/ https://mp.w...
  • Java_Java赛题分析

    [NUSTCTF 2022 新生赛]Ezjava1源码: 1234567891011121314151617181920212223242526272829303132333435363738package com.joe1sn.controller...
  • k8s target machine

    K8s Target Machinehttps://tryhackme.com/hacktivities?tab=search&page=1&free=all&order=most-popular&difficulty...
  • 春秋云镜:Exchange

    春秋云镜:Exchangehttps://exp10it.cn/2023/08/%E6%98%A5%E7%A7%8B%E4%BA%91%E9%95%9C-exchange-writeup/ https://fushuling.com/index.ph...
  • 春秋云镜:Brute4Road

    春秋云镜:Brute4Roadhttps://exp10it.cn/2023/08/%E6%98%A5%E7%A7%8B%E4%BA%91%E9%95%9C-brute4road-writeup/#flag01 https://fushuling.c...
  • 春秋云镜:Time

    春秋云境:Timehttps://exp10it.cn/2023/08/%E6%98%A5%E7%A7%8B%E4%BA%91%E9%95%9C-time-writeup/#flag01 https://fushuling.com/index.php...
  • 春秋云镜:Tsclient

    春秋云镜:Tsclienthttps://exp10it.cn/2023/07/%E6%98%A5%E7%A7%8B%E4%BA%91%E9%95%9C-tsclient-writeup/ https://fushuling.com/index.ph...
  • 春秋云镜:Initial

    春秋云镜:Initialhttps://exp10it.cn/2023/07/%E6%98%A5%E7%A7%8B%E4%BA%91%E9%95%9C-initial-writeup/ http://www.fzwjscj.xyz/index.php...
  • 强网拟态2023 部分wp

    [强网拟态 2023] 国际象棋与二维码搞一个49格子的国际象棋棋盘,与原图像异或,这里把原图扩大了49倍,49格的棋盘扩大了500倍,去异或。 12345678910111213141516171819202122from PIL import I...
  • ACTF2023 web部分

    ACTF2023 Web部分[ACTF 2023] MyGO’s Live!!!!!12345678910111213141516171819202122232425262728293031323334353637383940414243444546...
  • 记一处出题失误-Arnold变换算法

    记一处出题失误https://github.com/BuptMerak/mrctf-2022-writeups/blob/main/offical/MISC.md https://nano.ac/posts/dcf52abe/ https://nan...
  • 第七届"蓝帽杯"取证部分WriteUp

    第六届”蓝帽杯“半决赛 WriteUp【复现】1 解压密码7(G?fu9A8sdgfMsfsdrfE4q6#cf7af0fc1c 手机取证_1iPhone手机的iBoot固件版本号:(答案参考格式:iBoot-1.1.1) 手机取证_2该手机制作完...
  • NSSCTF 2nd

    [CISCN 2023 初赛]go_sessionhttps://un1novvn.github.io/2023/05/29/ciscn2023/ https://ctf.njupt.edu.cn/archives/898#go_session m...
  • 漏洞复现:CVE-2023-2317 【Typora 远程代码执行漏洞】

    漏洞复现:CVE-2023-2317 【Typora 远程代码执行漏洞】https://www.cnblogs.com/bktown/p/17673366.html 1<embed style="height:0;" src...
  • php-python结合的一道题目

    [ccb2023] php-python结合的一道题目前言:这个题质量非常高的一道题目了。php源码审计,文件包含读取文件,还涉及png藏7z压缩包,bash_history命令记录,然后就是内网ssrf,session对象为字典对象,python的...
  • 渗透靶机

    0x00————————————0x00———–靶机————–0x00————————————Good:1python -c 'import pty;pty.spawn("/bin/bash")' 1<...
  • SCTF-misc复现

    SCTF-misc复现https://mp.weixin.qq.com/s?srcid=0620opbxPmXyPOUJNJ4FDXPb&scene=23&sharer_sharetime=1687223008749&mid=...
  • 2023CISCN华北分区赛-web

    2023CISCN华北分区赛-webpysym12345678910111213141516171819202122232425262728293031323334353637383940414243444546from flask import F...
  • W4ntY0u每日刷题

    目录:0x01-[羊城杯2020]easyphp考点:.htaccess的灵活运用参考: https://www.cnblogs.com/b1u3s/p/15966800.html https://blog.csdn.net/weixin_46684...
  • 近期MISC刷题总结

    近期MISC刷题总结-第一版0xff前言:近期对misc突发好感,用3-4天的空余时间刷了几十道buu misc的第4-5页的题目wp,刷到后面第6页感觉意义不是很大,就决定去刷近几年的国赛题和含金量比较高的比赛的misc题目,buu的misc就此搁...
  • 2023VNCTF复现

    2023VNCTF复现1.前言参考wp: https://mp.weixin.qq.com/s/8BjR_Hg2KZ9zAWZxIFpJAg https://blog.csdn.net/jyttttttt/article/details/129114...
  • 镜像制作记录

    镜像制作记录学习CTFd-Dockerfile123456789101112131415161718192021222324252627282930313233343536FROM python:3.7-alpineWORKDIR /opt/CTFd...
  • sstilabs镜像制作过程记录

    sstilabs镜像制作过程记录1.前言本镜像制作的项目来自于https://github.com/X3NNY/sstilabs 2.学习和借鉴python_flask比赛的Dockerfile参考的项目https://github.com/CTFT...
  • CTFd with Whale搭建过程记录【避坑指南】

    CTFd with Whale搭建过程记录【避坑指南】参考赵师傅:https://www.zhaoj.in/read-6333.html#_Direct_Frp 避坑指南:https://blog.csdn.net/weixin_51797394/a...
  • 安洵杯-MISC

    安洵杯-MISC1.打开文件Signal一串二进制数据12345from Crypto.Util.number import *with open('Signal','r') as f: context ...
  • RCE极限挑战

    RCE极限挑战https://ctf-show.feishu.cn/docx/ToiJd70SboRn52xhn3WcJsfjnah RCE挑战1源码: 12345678<?phperror_reporting(0);highlight_fil...
  • 友链代码

    友链 1234567- name: Jerem1ah link: https://lejeremiah.github.io description: 擅长端茶,倒水,打杂 avatar: https://raw.githubuserconten...
  • 完美解决hexo图片问题

    完美解决hexo图片问题【既可以本地预览又可以成功在博客上引入 | 而且方便直接复制图片!】 1.typora设置在偏好设置中进行如下设置: 12341.插图图片复制到指定路径如下:【需要在_posts同级文件下新建一个images文件夹】../.....
  • 天津攻防决赛wp

    天津攻防决赛wp Secondary_sqli: 1234567891011?name=12' and updatexml(1,(concat(0x7e,(database()))),1)%23&pass=1&cp=1&...
  • Hello World

    Welcome to Hexo! This is your very first post. Check documentation for more info. If you get any problems when using Hexo, yo...