Explore >> Select a destination


You are here

tcode2k16.github.io
| | karmanyaah.malhotra.cc
4.2 parsecs away

Travel
| | [AI summary] This article provides a technical writeup of the author's solutions to several advanced binary exploitation (pwn) challenges during the BCACTF 2022 CTF competition.
| | pwning.net
5.0 parsecs away

Travel
| | CTF Team @ Carnegie Mellon University
| | wachter-space.de
3.5 parsecs away

Travel
| | This is a writeup of an easy/medium pwn challenge called "Profile" featuring a type confusion, some GOT overwriting, and a funny but unnecessary one gadget exploit for the fun of it. We are given the following files: main.c profile (binary) Dockerfile docker-compose.yml Let's look at main.c and see if we can spot a vulnerability from the provided source code. #include #include #include #include struct person_t { int id; int age; char *name; }; void get_value(const char *msg, void *pval) { printf("%s", ms...
| | her.esy.fun
26.7 parsecs away

Travel
| [AI summary] The author shares a method to display their Emacs Org mode agenda page on their personal web start page using iframe embedding, shell scripts, and configuration files.