pwn
buffer-overflow
xor
FCSC 2025 - xortp
Writeup: xortp Challenge Overview This challenge involves exploiting a buffer overflow vulnerability in the “xortp” binary to gain a shell and read the flag. The exploit leverages …
Explorez mes analyses détaillées de challenges CTF et vulnérabilités
Writeup: xortp Challenge Overview This challenge involves exploiting a buffer overflow vulnerability in the “xortp” binary to gain a shell and read the flag. The exploit leverages …
Otis 10 - Breizh CTF 2025 Challenge Description Otis 10 is a Pwn challenge from Breizh CTF 2025. The binary simulates a transformation system between a cow and other creatures, and contains a classic …
Metamorph - Breizh CTF 2025 Challenge Description Metamorph is a Pwn category challenge from Breizh CTF 2025. It is a binary that accepts a shellcode as input but imposes certain restrictions on the …
JackPwn - Breizh CTF 2025 Challenge Description JackPwn is a Pwn category challenge from Breizh CTF 2025. It simulates a roulette game with a vulnerability. Binary Analysis Here is the source code of …
Write-up: Challenge de Reverse Engineering Introduction Ce write-up présente la résolution d’un challenge de reverse engineering où nous devions analyser du code assembleur pour trouver un flag …
Web Fuzzing Ce writeup couvre le cours Web Fuzzing sur HTB. Vue d’ensemble Le fuzzing web est une technique essentielle en pentesting qui consiste à tester systématiquement les entrées …
PwnMe Junior 2025 - overflowme WriteUp Description du challenge Le challenge overflowme est un exercice de buffer overflow sur un binaire 64 bits. Le programme attend une entrée utilisateur et …
Write-up: Overflowme - PwnMe Junior 2025 Description Overflowme est un challenge de type “buffer overflow” classique, parfait pour s’initier aux techniques d’exploitation …
PwnMe Junior 2025 - Evil-Hackers WriteUp Description du challenge Le challenge Evil-Hackers est une épreuve de Use-After-Free (UAF) sur un binaire 64 bits. Le programme gère des connexions de hackers …
Write-up: Evil Hackers - PwnMe Junior 2025 Description Evil Hackers est un challenge de type “use-after-free” (UAF) qui simule un système de gestion d’utilisateurs vulnérable. …
Pentesting SNMP - WriteUp rapide Note : SNMP (Simple Network Management Protocol) est souvent négligé dans les tests de sécurité mais peut révéler des informations sensibles sur les systèmes. …
GDB and NASM Assembly Guide This writeup provides a comprehensive guide to using GDB for debugging NASM assembly code, with practical examples and explanations. Instructions and Code for GDB and NASM …
SealedRune - Cyber Apocalypse 2024 Challenge Description SealedRune is a reverse engineering challenge from Cyber Apocalypse CTF 2024. The program expects a specific input which, when entered …
ImpossibleMaze - Cyber Apocalypse Challenge Description ImpossibleMaze is a reverse engineering challenge from the Cyber Apocalypse CTF 2024. The program simulates a maze that seems impossible to …
EndlessCycle - Cyber Apocalypse Challenge Description EndlessCycle is a reverse engineering challenge from Cyber Apocalypse CTF 2024. The program appears to trap the user in an endless loop, but …
EncryptedScroll - Cyber Apocalypse Challenge Description EncryptedScroll is a reverse engineering challenge from Cyber Apocalypse CTF 2024. The program simulates a magical scroll that only reveals its …