09 2024 档案
BaseCTF2024 pwn
摘要:[Week1] Ret2text exp from pwn import * context(os='linux',arch = 'amd64',log_level = 'debug') io = remote("challenge.basectf.fun",32537) #io = process
xyctf2024 pwn
摘要:hello world checksec 大多保护都开启了 main函数 int __fastcall main(int argc, const char **argv, const char **envp) { char buf[20]; // [rsp+0h] [rbp-20h] BYREF i