Skip to content

Instantly share code, notes, and snippets.

@xf1les
xf1les / 2022-HFCTF-vdq-exp.py
Last active April 12, 2022 03:29
2022 虎符 CTF Pwn 题目 vdq EXP
#!/usr/bin/env python3
from pwn import *
import warnings
warnings.filterwarnings("ignore", category=BytesWarning)
context(arch="amd64")
context(log_level="debug")
libc = ELF("./libc-2.27.so")
@xf1les
xf1les / 2022-starctf-babyarm-exp.c
Last active April 28, 2022 12:45
startCTF 2022 Pwn 题目 babyarm Writeup 和笔记(可以成功弹出 root shell)
/*
* Personal Writeup for *CTF 2022 PWN challenge babyarm
*
* Author: xf1les
*
* This EXP demonstrates a solution which can successfully pop a root shell rather than doing ORW (Open/Read/Write) to get flag
* (Reminder: I didn't solve this challenge during the event)
*
* ***
*
@xf1les
xf1les / 2022-0CTF-BabyHeap-2022-exp.py
Created September 19, 2022 11:14
My solution for BabyHeap 2022 (2022 0CTF/TCTF)
#!/usr/bin/env python3
from pwn import *
import warnings
warnings.filterwarnings("ignore", category=BytesWarning)
context(arch="amd64", log_level="debug")
p = remote("47.100.33.132", "2204")
# ~ p = process("./babyheap")
libcbase = None
@xf1les
xf1les / gist:970e3ceb7afd93c9198fe5fcc818d829
Created September 19, 2022 11:34
My solution for ezvm (2022 0CTF/TCTF)
#!/usr/bin/env python3
from pwn import *
import warnings
warnings.filterwarnings("ignore", category=BytesWarning)
context(arch="amd64", log_level="debug")
p = None
p_sl = lambda x, y : p.sendlineafter(y, str(x) if not isinstance(x, bytes) else x)
p_s = lambda x, y : p.sendafter(y, str(x) if not isinstance(x, bytes) else x)