-
咋不对捏?就对!
***收费WriteUP请购买后查看,VIP用户可免费查看***
-
5 金币
- MISC
- 4天前
-
good_http-writeup
***收费WriteUP请购买后查看,VIP用户可免费查看***
-
1 金币
- MISC
- 7天前
-
复眼
***收费WriteUP请购买后查看,VIP用户可免费查看***
-
2 金币
- MISC
- 11天前
-
Stager 10分钟全自动解决方案
***收费WriteUP请购买后查看,VIP用户可免费查看***
-
1 金币
- MISC
- 16天前
-
Plain
过滤telnet找到base64编码,解码就是flag
- MISC
- 16天前
-
Disney Endgame
difforiginal.srtaltered.srtgreyhats{uG1y_50n1C_g0E5_S1oW_B4bY!_1bf80d36a}
- MISC
- 16天前
-
Black and White
- MISC
- 17天前
-
C0rrupt
png文件的标题错误,因此我们首先修复它再修改图片宽高官方flag:n00bz{h0w_7h3_h41l_d1d_y0u_f1x_th1s?!!}提交官方flag才算对
- MISC
- 17天前
-
DigitalOcean
该旗帜隐藏在文本框中每张幻灯片的底部,使用鼠标滚动即可找到它!n00bz{d1g1t4l_0c34n_1s_5pon50r1ng_u5_2000_d0ll4r5_w0r7h_0f_cr3d1t5_7h4nk_y0u_s0_much}
- MISC
- 17天前
-
Sneaky Png
- MISC
- 17天前
-
So_snowy!
很多东西告诉我们使用stegsnow和给定的单词表,在idekCTF中有一个挑战,censored制作了一个脚本来使用它,做了一些更改,下面是脚本-#!/bin/bash#ThankstoCensored1375forthisscriptchall=$(cat./wordlists.txt)foriin$chall;doecho-e"===Password:$i===\n"stegsnow-C-p...
- MISC
- 17天前
-
Numbers
frompwnimport*#io=process('../src/chall.py')io=remote('challs.n00bzunit3d.xyz',13541)defsolve(x,y): possible=[] answer=0 foriinrange(1,y): possible.append(str(i)) foriinpossible: answer+=i.count(str...
- MISC
- 17天前
-
Stager
打开文件,我们看到varc='powershell-noP-sta-w1-enc指示powershellstager,将powershell安装到你的系统上,为进一步分析做准备,让我们继续IAAkAHsASABtAGAANABPAGAATgB1AH0AIAAgAD0AIABbAHQAeQBQAGUAX....大量的base64,通过cyberchef运行,并用结果覆盖base64.$.{.H.m....
- MISC
- 17天前
-
tcpdump
fromscapy.allimport*pcap=rdpcap('cap.pcap')output=open('ouput.png','wb')forpacketinpcap:ifRawinpacket:output.write(packet[Raw].load)output.close()n00bz{D1D_Y0U_GET_EVERYTH1NG_!?}
- MISC
- 17天前
-
jail
仅允许数字和特殊字符,$0提供不受限制的bashshell。因此$0将提供shell,然后cd进入目录并获取标志!n00bz{$0_g1ve5_sh3ll??!!!!}
- MISC
- 17天前
-
BeepBop
它是一个SSTV,使用QSSTV对其进行解码即可得到标志!n00bz{beep_bop_you_found_me!}
- MISC
- 17天前
-
Crack & Crack
#!/bin/bashfcrackzip-v-u-D-p/usr/share/wordlists/rockyou.txt../attachments/flag.zip#seethatthepasswordis'1337h4x0r'unzip../attachments/flag.zip#typethepassword'1337h4x0r'pdfcrack-fflag.pdf-w/usr/share...
- MISC
- 17天前
-
Hecked
echo-nvsFTPd_2.3.4_id|md5sum#a806fef72a92508b7a64776bb83ad4cb
- MISC
- 17天前
-
QRazy CSV
fromPILimportImageimportcsvdefdecode_coordinate(coord):x,y=map(int,coord.split(','))return(x,y)defdecode_coordinates(encoded_coordinates):return[decode_coordinate(coord)forcoordinencoded_coordinates]#...
- MISC
- 17天前
-
Amazing Song Lyrics
签到题名字的三个大写字母组成了ASL,即美国手语手语解码即可n00bz{americansignlanguagedecoded}
- MISC
- 17天前