Skip to content
Please note that GitHub no longer supports Internet Explorer.

We recommend upgrading to the latest Microsoft Edge, Google Chrome, or Firefox.

Learn more
Pwnable|Web Security|Cryptography CTF-style challenges
CSS JavaScript PHP Python HTML C Other
Branch: master
Clone or download
Latest commit 7a3c5df Jul 13, 2019
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
0ctf_final-2017 Update README.md Apr 10, 2018
0ctf_final-2018 update May 29, 2018
0ctf_quals-2018 h4x0rs.club front-end source code Jul 11, 2019
0x3004 Create README.md Apr 11, 2018
TesterMySQL update 21/03 Mar 20, 2017
Wargame_SQL Create README.md Mar 20, 2017
challs.manhluat.org Update README.md Apr 11, 2018
final.svattt.org final.svattt.org Mar 7, 2017
lixi_2018 Update README.md Jun 1, 2018
mario-ctf Create README.md Mar 20, 2017
meepwn-2017 Update README.md Apr 11, 2018
meepwn-2018/quals Update server.py Aug 12, 2018
svattt-2015 Create README.md Apr 18, 2018
svattt-2016
.gitignore hm Jan 22, 2018
README.md Update README.md Jul 12, 2019
pwnable_vn.jpg Add files via upload May 29, 2017

README.md

CTF-challenges-by-me

These are CTF-style challenges I've made. Hope you enjoyed ✌

Highlight

Tips: Like reading book, don't read the last pages first. Let's enjoy them for a day at least before checking writeup/sol. I've put a lot of my work in each one.

I'm going to describe my highlight challenges, which I like mostly. Also point out the interesting points of them.

Web

Name Language Summary Rating Level Describe yet ?
prisonbreakseason2 Python Python Jail ⭐⭐⭐⭐ 💀💀💀 ✔️
XYZBANK PHP MySQL type casting ⭐⭐ 💀💀 ✔️
XYZTemplate PHP/Javascript Javascript/XSS ⭐⭐ 💀💀
cryptowww PHP Hash extension / urldecode trick, HTTP Parameter Pollution ⭐⭐ 💀💀 ✔️
curl_story_part_1 PHP SSRF /w CRLF Injection (it was 0day) ⭐⭐⭐⭐ 💀💀 ✔️
luckygame PHP MySQLi /w session variable + php type juggling ⭐⭐⭐⭐ 💀💀💀 ✔️
simplehttp Ruby Ruby RCE /w WEBrick::Log.new ⭐⭐⭐⭐ 💀💀💀 ✔️
tower4 Python Format injection ⭐⭐⭐⭐ 💀💀 ✔️
lixi PHP PHP syntax trick ⭐⭐⭐ 💀💀 ✔️
LoginMe NodeJS RegExp injection, MongoDB ⭐⭐⭐ 💀 ✔️
h4x0rs.club PHP/JS CSP strict-dynamic, XSS, iframe in the middle, postMessage to top ⭐⭐⭐⭐ 💀💀💀 ✔️
h4x0rs.space PHP/JS CSP, Persistent XSS, AppCache, ServiceWorker ⭐⭐⭐⭐ 💀💀💀 ✔️
h4x0rs.date PHP/JS CSP, cache, <meta> Referrer override ⭐⭐⭐ 💀💀 ✔️

Pwnable

Name Summary Rating Level Describe yet ?
anotherarena Heap on another main_arena (threads) ⭐⭐⭐ 💀 ✔️
c0ffee Race condition, with 1-byte overwrite, nearly impossible to exploit ⭐⭐⭐⭐ 💀💀💀
pokedex Uninitialized memory -> Heap overflow ⭐⭐⭐ 💀💀 ✔️
rapgenius Uninitialized memory -> Use-After-Free + _IO_FILE abusing (_IO_read_* && _IO_write_*) ⭐⭐⭐ 💀💀 ✔️
castle Combine many of bugs: uninitliazed memory + stack overflow + heap overflow to defeat stack cookie eventually ⭐⭐⭐⭐ 💀💀💀
House-of-Cards Old school pwnable, overwriting ENV ⭐⭐⭐⭐ 💀💀 ✔️
h4x0rs.club pt3 Old school pwnable, Fake MySQL server, MySQL LOCAL INFILE ⭐⭐⭐⭐⭐ 💀💀💀 ✔️

Footer

Final round SVATTT 2016 Introduction page

Twitter: @l4wio

...Dành cả tuổi thanh xuân để suy nghĩ đề CTF.

Updating...

You can’t perform that action at this time.