Develop simple PHP obfuscator and de obfuscator

I really want to go out to play _ (: ☒ "∠) _ but I can't get out, so I have to ask questions at home at the invitation of the XCTF Anti epidemic Game. But what should I do if I don't know? I happened to see an article of Xray complaining that the average code development ability of security practitioners is poor. Considering the need for certain development ability to solve confusion, let's use the question of confusion water

zsx in Code sharing / 4 / 13482

Beancount double entry bookkeeping: Why and How of grounding

I haven't written an article for a long time. Let's just take out my recent research and make up a number. Unexpectedly, it is an article that has nothing to do with technology (. This article is personal oriented Non professional The bookkeeping course aims at Amway Beancount and introduces some usage methods of Beancount that adapt to China's national conditions. If you like manual bookkeeping, Beancount may be the best bookkeeping tool; If you don't like manual work and just want to finish bookkeeping quickly, Beancount is also suitable for you.

zsx in Record arrangement / 6 / 24214

Analyzing PHP encryption extension from Zend virtual machine

This time in RCTF2019, I asked a question about SourceGuardian decryption. And Hook zend_compile_string Can be solved php_screw php-beast Like other extensions, there are still general (or more general) cracking schemes for extensions that do not make major changes to the overall execution process of PHP. Among them, SourceGuardian is an example. This article will talk about this kind of encryption cracking scheme from the perspective of Zend virtual machine.

For the title and Writeup of this question, see:

First, we need to be familiar with the process of PHP code execution -- that is, PHP is like

zsx in Record arrangement / 0 / 15264

Strong Net Cup "Egg" -- Divergent Thinking of Shiro 1.2.4 (SHIRO-550) Vulnerability

In the "Super Tennis Cup" competition held last weekend, there was a very interesting question, "Eggs". The problem surface is as follows: I finally used the UDF of the unexpected PostgreSQL solution to solve this problem, but the positive solution was not found. just right, The analysis article of orange god let me find the correct solution. This article is a divergent debug note for this vulnerability.

zsx in code analysis / 8 / 27148

Can your web app play a calculator?

With the rapid development of front-end technology, more and more software is using browser related technologies as part of its composition. Compared with software developed entirely using traditional client technology, software developed partially or completely using web front-end technology has the advantages of low development cost and low deployment cost. But naturally, we can also attack these clients with the commonly used techniques against the Web. Because the client software has greater permissions, the attack technology with severely limited use scenarios on the Web can often cause greater harm.

zsx in Simple thinking / 4 / 13493