#buuctf
[DASCTF 2022]WEB-ezpop
题目如下: <?php class crow { public $v1; public $v2; function e ...
[wustctf2020]closed
很短看起来很简单的题目,main()如下: __int64 vulnerable() { puts(“HaHaHa!\nWhat else can ...
[BUUCTF]pwnable_start
题目如下: public _start _start proc near ...
[BUUCTF]others_babystack
main函数如下: __int64 __fastcall main(__int64 a1, char **a2, char **a3) { char ...
[gyctf2020]borrowstack
main函数如下: int __cdecl main(int argc, const char **argv, const char **envp) { ...
[bjdctf2020]babyrop2
普通的ret2libc,开启了canary保护。 ...
[BUUCTF]picoctf_2018_rop chain
32位,vuln()存在栈溢出,获取flag时,在flag()中存在判定,flag()代码如下: int __cdecl flag(int a1) { ...