Exploits scripts and writeups for the https://pwnable.kr/play.php CTF challenges
Requires pwntools (https://github.com/Gallopsled/pwntools)
Each challenge is contained in its own folder
Each folder consists of 4 files :
- setup.sh : Setup script usually for downloading the provided files for the challenge (run before exploit)
- exploit.[py|sh] : Exploit script retrieving the flag from the target
- clean.sh : Cleanup script to revert the folder content to the 4 initial files
- writeup.md : Writeup explaining the exploit script
- unsolved
- solved
- solved with writeup (writeup)
- fd (writeup)
- collision (writeup)
- bof (writeup)
- flag (writeup)
- passcode (writeup)
- random
- input
- leg
- mistake
- shellshock
- coin1
- blackjack
- lotto
- cmd1
- cmd2
- uaf
- memcpy
- asm
- unlink
- blukat
- horcruxes
- brain fuck
- md5 calculator
- simple login
- otp
- ascii_easy
- tiny_easy
- fsb
- dragon
- fix
- syscall
- crypto1
- echo1
- echo2
- rsa calculator
- note
- alloca
- loveletter
- proxy server
- rootkit
- dos4fun
- ascii
- aeg
- coin2
- maze
- wtf
- sudoku
- starcraft
- cmd3
- elf
- lfh
- lokihardt
- asg
- hunter
- mipstake
- unexploitable
- tiny
- softmmu
- towelroot
- nuclear
- malware
- exploitable
- tiny_hard
- kcrc
- exynos
- combabo calculator
- pwnsandbox
- crcgen