liboxin on 2026-05-09 16:16:
@khaledddd a good pwn challenge,I've pwned your elf file by writing the shellcode and overflowing the buffer
liboxin@ubuntu:~/pwn$ ls
exp.py flag vuln
liboxin@ubuntu:~/pwn$ python3 exp.py
[+] Starting local process './vuln': pid 82795
[+] buf = 0x7ffd6fb42630
[*] Switching to interactive mode
$ ls
exp.py flag vuln
$ cat flag
flag{pwned_by_liboxin}
$
khaledddd on 2026-05-10 03:35:
@liboxin great job, i hope you enjoyed the crackme :-)
You must be logged in to submit a writeup
Write a comment
Share how awesome the crackme was or where you struggle to finish it! Stay polite and do not spoil the solution/flag!
Please keep the comments section English-only.
Rate the difficulty
How would you rate the difficulty of this crackme ?