#buuctf
[DASCTF 2022]WEB-ezpop
题目如下:
<?php
class crow
{
public $v1;
public $v2;
function e
...
[wustctf2020]closed
很短看起来很简单的题目,main()如下:
__int64 vulnerable()
{
puts(“HaHaHa!\nWhat else can
...
[BUUCTF]pwnable_start
题目如下:
public _start
_start proc near
...
[BUUCTF]others_babystack
main函数如下:
__int64 __fastcall main(__int64 a1, char **a2, char **a3)
{
char
...
[gyctf2020]borrowstack
main函数如下:
int __cdecl main(int argc, const char **argv, const char **envp)
{
...
[bjdctf2020]babyrop2
普通的ret2libc,开启了canary保护。
...
[BUUCTF]picoctf_2018_rop chain
32位,vuln()存在栈溢出,获取flag时,在flag()中存在判定,flag()代码如下:
int __cdecl flag(int a1)
{
...