Well, I think only logging pwnables of all kinds of CTFs is really not enough.
The important thing here is categorize.
So I try to split these pwnables into relevant district based on
the key point to the solution which belongs to.
This now including:
- heap
- io_file
- partial_overwrite
- solutions to challs at Pwnable.Kr
- seccomp_relevant
- uninitialized_Variable
- windows_Pwnable
- reversing_style_pwnable
- Type_confusion
- ThinerDAS!!
- acm
- some snippet for prove_of_Concept
- great CTF's challenging challs
afang.xyz Interesting Pwnables sharing blog~
canyouhugme.com Same refer as above~