Remove all the old content in README

This commit is contained in:
Amanpreet Singh 2015-04-26 11:19:52 +05:30
parent 882cf67fb6
commit d1547ba921

View file

@ -1,90 +1,5 @@
#CTF Tools
Since I lost my laptop a month back, with that I lost all the collection of my important CTF solving softwares and tools. It takes time to build up the collection. So I am adding them all here, just in case.
_If you know a tool that isn't present here, feel free to open a pull request._
# Requirements
- java
- python
## List
- Stegano
- Stegsolve
- Steganabara
- [Steghide](http://steghide.sourceforge.net/)
- pngtools - For various analysis related to PNGs
- `apt-get install pngtools`
- [SmartDeblur](https://github.com/Y-Vladimir/SmartDeblur) Used to deblur and fix defocused images
- Crypto
- XORTool
- [RSATool](https://github.com/ius/rsatool) - Generate private key with knowledge of p and q
- Forensics
- [Volatility](https://github.com/volatilityfoundation/volatility) - To investigate memory dumps
- [Shellbags](https://github.com/williballenthin/shellbags) - Investigate NT\_USER.dat files
- Foremost - Extract particular kind of files using headers
- `apt-get install foremost
- Wireshark - Analyze the network dumps
- `apt-get install wireshark`
- Audacity - Analyze sound files (mp3, m4a, whatever)
- `apt-get install audacity`
- extundelete - Used for recovering lost data from mountable images
- fsck.ext4 - Used to fix corrupt filesystems
- [RegistryViewer](http://www.gaijin.at/en/getitpage.php?id=regview) - Used to view windows registries
- [More registry viewers](http://www.forensicswiki.org/wiki/Windows_Registry)
- bkhive and samdump2 - Dump SYSTEM and SAM files
- [creddump](https://code.google.com/p/creddump/) - Dump windows credentials
- [UsbForensics](http://www.forensicswiki.org/wiki/USB_History_Viewing) - Contains many tools for usb forensics
- [ResourcesExtract] - Extract various filetypes from exes
- [CFF Explorer](http://www.ntcore.com/exsuite.php) - PE Editor
- Bruteforcers
- John The Ripper
- John The Jumbo
- Ophcrack
- Reversing
- [Krakatau](https://github.com/Storyyeller/Krakatau) - Java decompiler and disassembler
- IDA Pro - Ultimate solution to reversing needs
- [Uncompyle](https://github.com/williballenthin/shellbags) - Decompile Python 2.7 binaries (.pyc)
- JavaScript Deobfustcators
- [Detox](http://relentless-coding.org/projects/jsdetox/install)
- [Malzilla](http://malzilla.sourceforge.net/downloads.html)
- [Revelo](http://www.kahusecurity.com/tools/Revelo_v0.6.zip)
- Further you can put a breakpoint before return statement in debuggers to find the final code to be executed
- [BinWalk](https://github.com/devttys0/binwalk) - Analyze, reverse engineer, and extract firmware images.
- [Jadx](https://github.com/skylot/jadx) - Decompile Android files
- [ApkTool](http://ibotpeaches.github.io/Apktool/) - Android Decompiler
- [apk2Gold](https://github.com/lxdvs/apk2gold) - Yet another Android decompiler
- [Boomerang](https://github.com/nemerle/boomerang) - Decompile x86 binaries to C
- Web
- [XSSer](http://xsser.sourceforge.net/) - Automated XSS testor
- [SQLMap](https://github.com/sqlmapproject/sqlmap) - Automatic SQL injection and database takeover tooli
- Exploits
- [Metasploit](http://www.metasploit.com/) - Most used penetration testing software
- [pwntools](https://github.com/Gallopsled/pwntools) - CTF Framework for writing exploits
- Attacks
- [Layer 2 attacks](https://github.com/tomac/yersinia) - Attack various protocols on layer 2
### Services
- [Request Bin](http://requestb.in/) - Lets you inspect http requests to a particular url
- [CSWSH](http://ironwasp.org/cswsh.html) - Cross-Site WebSocket Hijacking Tester
### Tools used for creation
- JavaScript Obfustcators
- Metasploit JavaScript Obfustcator
- Uglify
- [Registry Dumper](http://www.kahusecurity.com/tools/RegistryDumper_v0.1.zip) - Dump your registry