Skip to content

Commit a425312

Browse files
committed
owo wwctf
1 parent eca295d commit a425312

File tree

297 files changed

+2728
-1893
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

297 files changed

+2728
-1893
lines changed

.github/workflows/dispatch.yml

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,18 @@
1-
name: Dispatch to Main Repo
2-
3-
on:
4-
push:
5-
branches:
6-
- master
7-
8-
jobs:
9-
dispatch:
10-
runs-on: ubuntu-latest
11-
12-
steps:
13-
- name: Trigger main repo workflow
14-
uses: peter-evans/repository-dispatch@v3
15-
with:
16-
token: ${{ secrets.PAT }}
17-
repository: octo-kumo/octo-kumo.github.io
18-
event-type: submodule-updated
1+
name: Dispatch to Main Repo
2+
3+
on:
4+
push:
5+
branches:
6+
- master
7+
8+
jobs:
9+
dispatch:
10+
runs-on: ubuntu-latest
11+
12+
steps:
13+
- name: Trigger main repo workflow
14+
uses: peter-evans/repository-dispatch@v3
15+
with:
16+
token: ${{ secrets.PAT }}
17+
repository: octo-kumo/octo-kumo.github.io
18+
event-type: submodule-updated

.gitignore

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,20 @@
1-
!.gitignore
2-
.DS_Store
3-
.obsidian
4-
*
5-
!*/
6-
!*.md
7-
node_modules/
8-
.idea/
9-
.venv/
10-
.vscode/
11-
!tools/
12-
!tools/web/*
13-
__pycache__/
14-
!.github/*
15-
!.github/workflows/dispatch.yml
16-
.mine
17-
.*.md
18-
19-
_*/
1+
!.gitignore
2+
.DS_Store
3+
.obsidian
4+
*
5+
!*/
6+
!*.md
7+
node_modules/
8+
.idea/
9+
.venv/
10+
.vscode/
11+
!tools/
12+
!tools/web/*
13+
__pycache__/
14+
!.github/*
15+
!.github/workflows/dispatch.yml
16+
.mine
17+
.*.md
18+
19+
_*/
2020
.*/

2021-appventure-ctf/pwn/Printwriter 1.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,12 @@
11
---
2-
ai_date: '2025-04-27 05:10:12'
3-
ai_summary: Format string attack exploited to gain remote shell by replacing '/bin/ls'
4-
with '/bin/sh'
2+
ai_date: 2025-04-27 05:10:12
3+
ai_summary: Format string attack exploited to gain remote shell by replacing '/bin/ls' with '/bin/sh'
54
ai_tags:
6-
- fmt-str
7-
- rop
8-
- shell
5+
- fmt-str
6+
- rop
7+
- shell
98
created: 2021-12-21T23:50
10-
updated: 2024-06-10T23:38
9+
updated: 2025-07-14T09:46
1110
---
1211

1312
## Printwriter 1

2021-appventure-ctf/web/AppVenture Login Part 0.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
ai_date: '2025-04-27 05:10:15'
2+
ai_date: 2025-04-27 05:10:15
33
ai_summary: Flag found in robots.txt disallowed path pointing to source code
44
ai_tags:
5-
- robots.txt
6-
- src-code
7-
- 信息披露
5+
- robots.txt
6+
- src-code
7+
- 信息披露
88
created: 2021-12-21T23:50
9-
updated: 2024-06-10T23:38
9+
updated: 2025-07-14T09:46
1010
---
1111

1212
## AppVenture Login Part 0

2021-appventure-ctf/web/AppVenture Login Part 1.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
2-
ai_date: '2025-04-27 05:10:19'
2+
ai_date: 2025-04-27 05:10:19
33
ai_summary: SQL injection vulnerability due to unescaped user input in a query
44
ai_tags:
5-
- sql
6-
- injection
5+
- sql
6+
- injection
77
created: 2021-12-21T23:50
8-
updated: 2024-06-10T23:41
8+
updated: 2025-07-14T09:46
99
---
1010

1111
## AppVenture Login Part 1

2021-appventure-ctf/web/AppVenture Login Part 2.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,12 @@
11
---
2-
ai_date: '2025-04-27 05:10:26'
3-
ai_summary: Script bruteforces password by checking characters one at a time using
4-
SQL substring.
2+
ai_date: 2025-04-27 05:10:26
3+
ai_summary: Script bruteforces password by checking characters one at a time using SQL substring.
54
ai_tags:
6-
- sql
7-
- brute-force
8-
- sub-string
5+
- sql
6+
- brute-force
7+
- sub-string
98
created: 2021-12-21T23:50
10-
updated: 2024-06-10T23:38
9+
updated: 2025-07-14T09:46
1110
---
1211

1312
## AppVenture Login Part 2

2021-appventure-ctf/web/Espace 0.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,12 @@
11
---
2-
ai_date: '2025-04-27 05:10:32'
3-
ai_summary: Exploited YAML deserialization vulnerability (RCE) in PyYAML 5.3.1 for
4-
remote code execution, using a crafted payload.
2+
ai_date: 2025-04-27 05:10:32
3+
ai_summary: Exploited YAML deserialization vulnerability (RCE) in PyYAML 5.3.1 for remote code execution, using a crafted payload.
54
ai_tags:
6-
- yaml
7-
- rce
8-
- deserialization
5+
- yaml
6+
- rce
7+
- deserialization
98
created: 2021-12-21T23:50
10-
updated: 2024-06-21T21:29
9+
updated: 2025-07-14T09:46
1110
---
1211

1312
## Espace 0

2021-appventure-ctf/web/Super Secure Trustable Implementation.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,12 @@
11
---
2-
ai_date: '2025-04-27 05:10:37'
3-
ai_summary: Bypassed server-side filtering using template string manipulation and
4-
__import__ to execute system command
2+
ai_date: 2025-04-27 05:10:37
3+
ai_summary: Bypassed server-side filtering using template string manipulation and __import__ to execute system command
54
ai_tags:
6-
- xss
7-
- template-string
8-
- exploitation
5+
- xss
6+
- template-string
7+
- exploitation
98
created: 2021-12-21T23:50
10-
updated: 2024-06-21T21:30
9+
updated: 2025-07-14T09:46
1110
---
1211

1312
## Super Secure Trustable Implementation

2022-CDDC/crypto/PaddingOracle/index.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,12 @@
11
---
2-
ai_date: '2025-04-27 05:10:43'
3-
ai_summary: Base64-encoded flag input required, likely involving a simple bruteforce
4-
or input validation bypass.
2+
ai_date: 2025-04-27 05:10:43
3+
ai_summary: Base64-encoded flag input required, likely involving a simple bruteforce or input validation bypass.
54
ai_tags:
6-
- base64
7-
- brute
8-
- input-validation
5+
- base64
6+
- brute
7+
- input-validation
98
created: 2024-06-11T01:17
10-
updated: 2024-07-07T23:08
9+
updated: 2025-07-14T09:46
1110
---
1211

1312
```text

2022-CDDC/crypto/Vigenere/index.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
ai_date: '2025-04-27 05:10:45'
2+
ai_date: 2025-04-27 05:10:45
33
ai_summary: Vigenere cipher decryption challenge with key 'key'
44
ai_tags:
5-
- vigenere
6-
- cipher
7-
- decryption
5+
- vigenere
6+
- cipher
7+
- decryption
88
created: 2024-06-11T01:17
9-
updated: 2024-07-07T23:09
9+
updated: 2025-07-14T09:46
1010
---
1111

1212
```text

0 commit comments

Comments
 (0)