2015-04-26 08:12:10 +00:00
|
|
|
# CTF Tools [![Build Status](https://travis-ci.org/apsdehal/ctf-tools.svg?branch=master)](https://travis-ci.org/apsdehal/ctf-tools)
|
2015-02-28 05:48:21 +00:00
|
|
|
|
2015-04-26 06:18:50 +00:00
|
|
|
A curated list of CTF frameworks, libraries, resources and softwares.
|
2015-02-28 05:48:21 +00:00
|
|
|
|
2015-04-26 05:50:19 +00:00
|
|
|
### Contributing
|
2015-02-28 05:51:44 +00:00
|
|
|
|
2015-04-26 06:33:39 +00:00
|
|
|
Please take a quick look at the [contribution guidelines](https://github.com/apsdehal/ctf-tools/blob/master/CONTRIBUTING.md) first.
|
2015-04-26 05:50:19 +00:00
|
|
|
|
|
|
|
#### _If you know a tool that isn't present here, feel free to open a pull request._
|
2015-03-19 08:42:06 +00:00
|
|
|
|
2015-04-26 06:27:07 +00:00
|
|
|
### Why?
|
|
|
|
|
|
|
|
It takes time to build up collection of tools used in ctf and remember them all. This repo helps to keep all these scattered tools at one place.
|
|
|
|
|
|
|
|
|
2015-04-26 05:50:45 +00:00
|
|
|
### Contents
|
|
|
|
|
|
|
|
- [CTF Tools](#ctf-tools)
|
|
|
|
- [Create](#create)
|
|
|
|
- [Forensics](#create-forensics)
|
2015-04-26 08:05:02 +00:00
|
|
|
- [Web](#create-web)
|
2015-04-26 05:50:45 +00:00
|
|
|
- [Solve](#solve)
|
|
|
|
- [Attacks](#solve-attacks)
|
|
|
|
- [Bruteforcers](#solve-bruteforcers)
|
|
|
|
- [Creation Tools](#solve-create)
|
|
|
|
- [Cryptography](#solve-crypto)
|
|
|
|
- [Exploits](#solve-exploits)
|
|
|
|
- [Forensics](#solve-forensics)
|
|
|
|
- [Miscellaneous](#solve-misc)
|
|
|
|
- [Reversing](#solve-reversing)
|
|
|
|
- [Services](#solve-services)
|
|
|
|
- [Steganography](#solve-stegano)
|
|
|
|
- [Web](#solve-web)
|
2015-04-26 05:51:01 +00:00
|
|
|
|
2015-04-26 05:57:15 +00:00
|
|
|
- [Resources](#resources)
|
|
|
|
- [Websites](#resources-websites)
|
|
|
|
- [Tutorials](#resources-tutorials)
|
|
|
|
|
|
|
|
|
2015-04-26 05:52:43 +00:00
|
|
|
# Create
|
2015-04-26 05:51:01 +00:00
|
|
|
|
|
|
|
*Tools used for creating CTF challenges*
|
|
|
|
|
|
|
|
## Forensics
|
|
|
|
|
|
|
|
*Tools used for creating Forensics challenges*
|
|
|
|
|
2015-03-19 09:32:49 +00:00
|
|
|
- [Registry Dumper](http://www.kahusecurity.com/tools/RegistryDumper_v0.1.zip) - Dump your registry
|
2015-04-26 05:51:01 +00:00
|
|
|
|
|
|
|
## Web
|
|
|
|
|
|
|
|
*Tools used for creating Web challenges*
|
|
|
|
|
|
|
|
*JavaScript Obfustcators*
|
|
|
|
|
2015-04-26 06:47:33 +00:00
|
|
|
- [Metasploit JavaScript Obfustcator](https://github.com/rapid7/metasploit-framework/wiki/How-to-obfuscate-JavaScript-in-Metasploit)
|
|
|
|
- [Uglify](http://marijnhaverbeke.nl//uglifyjs)
|
2015-04-26 05:51:01 +00:00
|
|
|
|
|
|
|
|
2015-04-26 05:52:43 +00:00
|
|
|
# Solve
|
2015-04-26 05:51:19 +00:00
|
|
|
|
|
|
|
*Tools used for solving CTF challenges*
|
|
|
|
|
2015-04-26 06:11:06 +00:00
|
|
|
## Attacks
|
2015-04-26 05:51:19 +00:00
|
|
|
|
2015-04-26 06:11:06 +00:00
|
|
|
*Tools used for performing various kinds of attacks*
|
2015-04-26 05:51:19 +00:00
|
|
|
|
2015-04-26 06:11:06 +00:00
|
|
|
- [Layer 2 attacks](https://github.com/tomac/yersinia) - Attack various protocols on layer 2
|
2015-04-26 05:51:19 +00:00
|
|
|
|
|
|
|
## Crypto
|
|
|
|
|
|
|
|
*Tools used for solving Crypto challenges*
|
|
|
|
|
|
|
|
- [RSATool](https://github.com/ius/rsatool) - Generate private key with knowledge of p and q
|
2015-04-26 08:05:02 +00:00
|
|
|
- [XORTool](https://github.com/hellman/xortool) - A tool to analyze multi-byte xor cipher
|
2015-04-26 05:51:19 +00:00
|
|
|
|
2015-04-26 06:11:06 +00:00
|
|
|
## Bruteforcers
|
|
|
|
|
|
|
|
*Tools used for various kind of bruteforcing (passwords etc.)*
|
|
|
|
|
2015-04-26 06:47:33 +00:00
|
|
|
- [John The Jumbo](https://github.com/magnumripper/JohnTheRipper) - Community enhanced version of John the Ripper
|
2015-04-26 08:05:02 +00:00
|
|
|
- [John The Ripper](http://www.openwall.com/john/) - Password Cracker
|
2015-04-26 06:47:33 +00:00
|
|
|
- [Ophcrack](http://ophcrack.sourceforge.net/) - Windows password cracker based on rainbow tables.
|
2015-04-26 06:11:06 +00:00
|
|
|
|
|
|
|
## Exploits
|
|
|
|
|
|
|
|
*Tools used for solving Exploits challenges*
|
|
|
|
|
2015-04-26 06:47:33 +00:00
|
|
|
- [Metasploit](http://www.metasploit.com/) - Penetration testing software
|
2015-04-26 06:11:06 +00:00
|
|
|
- [pwntools](https://github.com/Gallopsled/pwntools) - CTF Framework for writing exploits
|
|
|
|
|
2015-04-26 05:51:19 +00:00
|
|
|
## Forensics
|
|
|
|
|
|
|
|
*Tools used for solving Forensics challenges*
|
|
|
|
|
2015-04-26 06:25:12 +00:00
|
|
|
- [Audacity](http://sourceforge.net/projects/audacity/) - Analyze sound files (mp3, m4a, whatever)
|
2015-04-26 05:51:19 +00:00
|
|
|
- `apt-get install audacity`
|
2015-04-26 06:25:12 +00:00
|
|
|
- [bkhive and samdump2](http://sourceforge.net/projects/ophcrack/files/samdump2/) - Dump SYSTEM and SAM files
|
|
|
|
- `apt-get install samdump2 bkhive`
|
2015-04-26 05:51:19 +00:00
|
|
|
- [CFF Explorer](http://www.ntcore.com/exsuite.php) - PE Editor
|
2015-04-26 06:18:50 +00:00
|
|
|
- [creddump](https://code.google.com/p/creddump/) - Dump windows credentials
|
2015-04-26 06:25:12 +00:00
|
|
|
- [extundelete](http://extundelete.sourceforge.net/) - Used for recovering lost data from mountable images
|
|
|
|
- [Foremost](http://foremost.sourceforge.net/) - Extract particular kind of files using headers
|
2015-04-26 06:18:50 +00:00
|
|
|
- `apt-get install foremost`
|
2015-04-26 06:25:12 +00:00
|
|
|
- [fsck.ext4](http://linux.die.net/man/8/fsck.ext3) - Used to fix corrupt filesystems
|
2015-04-26 06:15:02 +00:00
|
|
|
- [Malzilla](http://malzilla.sourceforge.net/) - Malware hunting tool
|
|
|
|
- [PDF Streams Inflater](http://malzilla.sourceforge.net/downloads.html) - Find and extract zlib files compressed in PDF files
|
2015-04-26 06:25:12 +00:00
|
|
|
- [ResourcesExtract](http://www.nirsoft.net/utils/resources_extract.html) - Extract various filetypes from exes
|
2015-04-26 06:18:50 +00:00
|
|
|
- [Shellbags](https://github.com/williballenthin/shellbags) - Investigate NT\_USER.dat files
|
|
|
|
- [UsbForensics](http://www.forensicswiki.org/wiki/USB_History_Viewing) - Contains many tools for usb forensics
|
|
|
|
- [Volatility](https://github.com/volatilityfoundation/volatility) - To investigate memory dumps
|
2015-04-26 06:25:12 +00:00
|
|
|
- [Wireshark](https://www.wireshark.org/) - Analyze the network dumps
|
2015-04-26 06:18:50 +00:00
|
|
|
- `apt-get install wireshark`
|
|
|
|
|
|
|
|
*Registry Viewers*
|
|
|
|
- [RegistryViewer](http://www.gaijin.at/en/getitpage.php?id=regview) - Used to view windows registries
|
2015-04-26 08:05:02 +00:00
|
|
|
- [Windows Registry Viewers](http://www.forensicswiki.org/wiki/Windows_Registry) - More registry viewers
|
2015-04-26 05:51:19 +00:00
|
|
|
|
|
|
|
## Reversing
|
|
|
|
|
|
|
|
*Tools used for solving Reversing challenges*
|
|
|
|
|
2015-04-26 06:11:06 +00:00
|
|
|
- [Androguard](https://github.com/androguard/androguard) - Reverse engineer Android applications
|
|
|
|
- [Apk2Gold](https://github.com/lxdvs/apk2gold) - Yet another Android decompiler
|
|
|
|
- [ApkTool](http://ibotpeaches.github.io/Apktool/) - Android Decompiler
|
2015-04-26 06:18:50 +00:00
|
|
|
- [BinWalk](https://github.com/devttys0/binwalk) - Analyze, reverse engineer, and extract firmware images.
|
|
|
|
- [Boomerang](https://github.com/nemerle/boomerang) - Decompile x86 binaries to C
|
2015-04-26 06:47:33 +00:00
|
|
|
- [IDA Pro](https://www.hex-rays.com/products/ida/) - Most used Reversing software
|
2015-04-26 06:18:50 +00:00
|
|
|
- [Jadx](https://github.com/skylot/jadx) - Decompile Android files
|
2015-04-26 06:11:06 +00:00
|
|
|
- [Krakatau](https://github.com/Storyyeller/Krakatau) - Java decompiler and disassembler
|
2015-04-26 07:38:16 +00:00
|
|
|
- [Uncompyle](https://github.com/gstarnberger/uncompyle) - Decompile Python 2.7 binaries (.pyc)
|
2015-04-26 06:11:06 +00:00
|
|
|
|
|
|
|
*JavaScript Deobfustcators*
|
|
|
|
|
2015-04-26 06:47:33 +00:00
|
|
|
- [Detox](http://relentless-coding.org/projects/jsdetox/install) - A Javascript malware analysis tool
|
|
|
|
- [Revelo](http://www.kahusecurity.com/tools/Revelo_v0.6.zip) - Analyze obfuscated Javascript code
|
2015-04-26 05:51:19 +00:00
|
|
|
|
2015-04-26 06:11:06 +00:00
|
|
|
## Services
|
2015-04-26 05:51:19 +00:00
|
|
|
|
2015-04-26 06:11:06 +00:00
|
|
|
*Various kind of useful services available around the internet*
|
2015-04-26 05:51:19 +00:00
|
|
|
|
2015-04-26 06:11:06 +00:00
|
|
|
- [CSWSH](http://ironwasp.org/cswsh.html) - Cross-Site WebSocket Hijacking Tester
|
2015-04-26 06:18:50 +00:00
|
|
|
- [Request Bin](http://requestb.in/) - Lets you inspect http requests to a particular url
|
2015-04-26 05:51:19 +00:00
|
|
|
|
2015-04-26 06:11:06 +00:00
|
|
|
## Stegano
|
2015-04-26 05:51:19 +00:00
|
|
|
|
2015-04-26 06:11:06 +00:00
|
|
|
*Tools used for solving Steganography challenges*
|
2015-04-26 05:51:19 +00:00
|
|
|
|
2015-04-26 06:47:33 +00:00
|
|
|
- [pngtools](http://www.stillhq.com/pngtools/) - For various analysis related to PNGs
|
2015-04-26 06:11:06 +00:00
|
|
|
- `apt-get install pngtools`
|
2015-04-26 06:47:33 +00:00
|
|
|
- [SmartDeblur](https://github.com/Y-Vladimir/SmartDeblur) - Used to deblur and fix defocused images
|
|
|
|
- [Steganabara](https://www.openhub.net/p/steganabara) - Tool for stegano analysis written in Java
|
|
|
|
- [Steghide](http://steghide.sourceforge.net/) - Hide data in various kind of images
|
|
|
|
- [Stegsolve](http://www.caesum.com/handbook/Stegsolve.jar) - Apply various steganography techniques to images
|
2015-04-26 05:51:19 +00:00
|
|
|
|
2015-04-26 06:11:06 +00:00
|
|
|
## Web
|
2015-04-26 05:51:19 +00:00
|
|
|
|
2015-04-26 06:11:06 +00:00
|
|
|
*Tools used for solving Web challenges*
|
2015-04-26 05:51:19 +00:00
|
|
|
|
2015-04-26 06:11:06 +00:00
|
|
|
- [SQLMap](https://github.com/sqlmapproject/sqlmap) - Automatic SQL injection and database takeover tooli
|
2015-04-26 06:18:50 +00:00
|
|
|
- [XSSer](http://xsser.sourceforge.net/) - Automated XSS testor
|
2015-04-26 05:57:15 +00:00
|
|
|
|
|
|
|
|
|
|
|
# Resources
|
|
|
|
|
2015-04-26 06:05:05 +00:00
|
|
|
*Where to discover about CTF*
|
|
|
|
|
2015-04-26 05:57:15 +00:00
|
|
|
## Websites
|
|
|
|
|
2015-04-26 06:05:05 +00:00
|
|
|
*Various general websites about and on ctf*
|
|
|
|
|
|
|
|
- [CTF Time](https://ctftime.org/) - General information on CTF occuring around the worlds
|
|
|
|
|
|
|
|
## Writeups Collections
|
|
|
|
|
|
|
|
*Collections of CTF writeups*
|
|
|
|
|
|
|
|
- [CTF Writeups (Community)](https://github.com/ctfs/) - CTF Writeups Repos maintained by community
|
|
|
|
- [Shell Storm](shell-storm.org/repo/CTF/) - CTF Writeups Repo maintained by Jonathan Salwan
|
2015-04-26 05:57:15 +00:00
|
|
|
|
|
|
|
## Tutorials
|
|
|
|
|
2015-04-26 06:05:05 +00:00
|
|
|
*Tutorials to learn how to play CTFs*
|
2015-04-26 06:35:02 +00:00
|
|
|
|
|
|
|
### LICENSE
|
|
|
|
|
|
|
|
MIT :)
|