MISC
Simple Encryption
伪加密01 02后面的09 00 改为00 00 即可
萧河
补png头 89 50 4E 47
base套
Python import base64
def recursive_base64_decode(data): decoded_data = base64.b64decode(data.encode()).decode('utf-8', 'ignore')
# 寻找特定字词,例如 '是' keyword = '是' if keyword in decoded_data: index = decoded_data.index(keyword) decoded_data = decoded_data[index + len(keyword):]
if '}' in decoded_data: return decoded_data else: return recursive_base64_decode(decoded_data)
base64_encoded_data = "初始Base64数据" # 替换成您的初始Base64编码数据
final_data = recursive_base64_decode(base64_encoded_data) print("解密后的数据:", final_data) |
Ez-osint
https://www.bilibili.com/video/BV13K4y1s7qQ/?spm_id_from=333.999.0.0&vd_source=f7e76ebc6ca15fbb8c8dc4909fad4f40
为什么不换换思路捏

最终试炼hhh
文件逆转,然后zip伪加密,是一个pdf,判断是pdf隐写,然后用wbStego4.3open解密,得出flag
WEB
源码!启动!
点下网址栏再f12查看源码即可
webshell是啥捏
passthru()

Hello,you

细狗2.0

ez_php1

PHP <?php $KEY = "YES I love"; echo serialize($KEY); ?> |

PHP <?php class Clazz {
public $a; public $b; }
$a=new Clazz(); $a ->b = &$a ->a; echo serialize($a);
?> |

解密base64即可
EZ_eval
