Reverse
「已注销」
这个作者很懒,什么都没留下…
展开
-
羊城杯 2020 Bytecode
羊城杯 2020 Bytecode恢复的代码块def test(): en = [3,37,72,9,6,132] output = [101,96,23,68,112,42,107,62,96,53,176,179,98,53,67,29,41,120,60,106,51,101,178,189,101,48] print(b'welcome to GWHT2020') flag = 'GWHT{fc2a8bb7f347a6f8a05c5c69f3aeff73}'原创 2021-08-12 15:58:03 · 273 阅读 · 0 评论 -
xctf reversing2
a = [0xBB, 0xCC, 0xA0, 0xBC, 0xDC, 0xD1, 0xBE, 0xB8, 0xCD, 0xCF, 0xBE, 0xAE, 0xD2, 0xC4, 0xAB, 0x82, 0xD2, 0xD9, 0x93, 0xB3, 0xD4, 0xDE, 0x93, 0xA9, 0xD3, 0xCB, 0xB8, 0x82, 0xD3, 0xCB, 0xBE, 0xB9, 0x9A, 0xD7, 0xCC,0xDD]b = [0xBB, 0xAA, 0xCC, 0xDD]for .原创 2020-12-12 22:12:17 · 70 阅读 · 0 评论 -
xctf no-strings-attached
a = [0x143A, 0x1436, 0x1437, 0x143B, 0x1480, 0x147A, 0x1471, 0x1478, 0x1463, 0x1466, 0x1473, 0x1467 , 0x1462, 0x1465, 0x1473, 0x1460, 0x146B, 0x1471, 0x1478, 0x146A, 0x1473, 0x1470, 0x1464, 0x1478, 0x146E, 0x1470, 0x1470, 0x1464,.原创 2020-12-12 21:38:27 · 175 阅读 · 1 评论 -
buu equation
F12去标识:from z3 import *S = Solver()l = IntVector('l', 42)S.add(l[40]+l[35]+l[34]-l[0]-l[15]-l[37]+l[7]+l[6]-l[26]+l[20]+l[19]+l[8]-l[17]-l[14]-l[38]+l[1]-l[9]+l[22]+l[41]+l[3]-l[29]-l[36]-l[25]+l[5]+l[32]-l[16]+l[12]-l[24]+l[30]+l[39]+l[10]+l[2]+l[2原创 2020-11-30 22:17:52 · 214 阅读 · 0 评论 -
UTCTF2020 basic-re
原创 2020-10-15 19:54:51 · 349 阅读 · 0 评论 -
WUSTCTF2020 level4
已知树的中序和后序遍历,求先序遍历Traversal type 1:2f0t02T{hcsiI_SwA__r7Ee} 中序Traversal type 2:20f0Th{2tsIS_icArE}e7__w 后序绘图如下先序遍历为wctf2020{This_IS_A_7reE}原创 2020-10-13 23:04:37 · 218 阅读 · 0 评论 -
FlareOn4 login
var flag = "PyvragFvqrYbtvafNerRnfl@syner-ba.pbz";var rotFlag = flag.replace(/[a-zA-Z]/g, function(c){return String.fromCharCode((c <= "Z" ? 90 : 122) >= (c = c.charCodeAt(0) + 13) ? c : c - 26);});alert(rotFlag);原创 2020-07-11 17:08:54 · 260 阅读 · 0 评论