pwnProeasy
shellco — null-free XOR-halved shellcode
spbctf
Task: shellcode runner with three constraints — no NUL bytes, even length, and XOR of first half of bytes equal to XOR of second half. Solution: take a 23-byte null-free execve('/bin/sh') payload and concatenate it with itself (46 bytes, even length, halves identical, so XORs trivially match); pad the remainder of the 0x1000 read with NULs so read() returns immediately, then send shell commands on the same stdin.
$ ls tags/ techniques/
duplicated_shellcode_trickstdin_shell_command_passthroughnull_free_execve
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [pwn][Pro]Mic Check — getflag— spbctf
- [pwn][Pro]cat /flag under seccomp— spbctf
- [pwn][Pro]read_me_not — sendfile bypass— spbctf
- [pwn][Pro]Taste— grodno_new_year_2026
- [pwn][Pro]Baby bof— uoftctf2026