File tree 3 files changed +3
-4
lines changed
Binary Exploitation/got-2-learn-libc 3 files changed +3
-4
lines changed Original file line number Diff line number Diff line change @@ -15,7 +15,7 @@ Binary Exploitation
15
15
## Solution
16
16
Working solution [ solve.py] ( solution/solve.py )
17
17
18
- Thanks to [ @LFlare ] ( https://github.com/LFlare?tab=repositories ) for making the code compatible with ASLR
18
+ Thanks to [ @LFlare ] ( https://github.com/LFlare ) for making the code compatible with ASLR
19
19
20
20
### Flag
21
21
` picoCTF{syc4al1s_4rE_uS3fUl_6319ec91} `
Original file line number Diff line number Diff line change 1
1
#!/usr/bin/python
2
-
3
2
from pwn import *
4
3
import os .path
5
4
Original file line number Diff line number Diff line change @@ -33,7 +33,7 @@ This CTF was done with [@pauxy](https://github.com/pauxy) and [@StopDuckRoll](ht
33
33
- [ caesar cipher 2] ( Cryptography/caesar%20cipher%202 ) - 250
34
34
- [ rsa-madlibs] ( Cryptography/rsa-madlibs ) - 250
35
35
- SpyFi (Unsolved) - 300
36
- - Super Safe RSA (Unsolved) - 350
36
+ - [ Super Safe RSA] ( Cryptography/Super%20Safe%20RSA ) (Unsolved) - 350
37
37
- [ Super Safe RSA 2] ( Cryptography/Super%20Safe%20RSA%202 ) - 425
38
38
- [ Magic Padding Oracle] ( Cryptography/Magic%20Padding%20Oracle ) (Unsolved) - 450
39
39
- Super Safe RSA 3 (Unsolved) - 600
@@ -84,7 +84,7 @@ This CTF was done with [@pauxy](https://github.com/pauxy) and [@StopDuckRoll](ht
84
84
- [ assembly-1] ( Reversing/assembly-1 ) - 200
85
85
- [ be-quick-or-be-dead-1] ( Reversing/be-quick-or-be-dead-1 ) - 200
86
86
- [ quackme] ( Reversing/quackme ) - 200
87
- - [ assembly-2] ( Reversing/assembly-2 ) (Unsolved) - 250
87
+ - [ assembly-2] ( Reversing/assembly-2 ) - 250
88
88
- be-quick-or-be-dead-2 (Unsolved) - 275
89
89
- Radix's Terminal (Unsolved) - 400
90
90
- [ keygen-me-1] ( Reversing/keygen-me-1 ) (Unsolved) - 400
You can’t perform that action at this time.
0 commit comments