diff --git a/README.md b/README.md index 233c4e7..4ffe573 100644 --- a/README.md +++ b/README.md @@ -31,17 +31,20 @@ Installers for the following tools are included: | binary | [rp++](https://github.com/0vercl0k/rp) | Another gadget finder. | | forensics | [binwalk](https://github.com/devttys0/binwalk.git) | Firmware (and arbitrary file) analysis tool. | | forensics | [dislocker](http://www.hsc.fr/ressources/outils/dislocker/) | Tool for reading Bitlocker encrypted partitions. | +| forensics | [exetractor](https://github.com/kholia/exetractor-clone) | Unpacker for packed Python executables. Supports PyInstaller and py2exe. | | forensics | [firmware-mod-kit](https://code.google.com/p/firmware-mod-kit/) | Tools for firmware packing/unpacking. | | forensics | [testdisk](http://www.cgsecurity.org/wiki/TestDisk) | Testdisk and photorec for file recovery. | | forensics | [pdf-parser](http://blog.didierstevens.com/programs/pdf-tools/) | Tool for digging in PDF files | | forensics | [scrdec](https://gist.github.com/bcse/1834878) | A decoder for encoded Windows Scripts. | | crypto | [cribdrag](https://github.com/SpiderLabs/cribdrag) | Interactive crib dragging tool (for crypto). | +| crypto | [foresight](https://github.com/ALSchwalm/foresee) | A tool for predicting the output of random number generators. To run, launch "foresee". | | crypto | [hashpump](https://github.com/bwall/HashPump) | A tool for performing hash length extension attaacks. | | crypto | [hashpump-partialhash](https://github.com/mheistermann/HashPump-partialhash) | Hashpump, supporting partially-unknown hashes. | | crypto | [hash-identifier](https://code.google.com/p/hash-identifier/source/checkout) | Simple hash algorithm identifier. | | crypto | [littleblackbox](https://github.com/devttys0/littleblackbox) | Database of private SSL/SSH keys for embedded devices. | | crypto | [pemcrack](https://github.com/robertdavidgraham/pemcrack) | SSL PEM file cracker. | | crypto | [reveng](http://reveng.sourceforge.net/) | CRC finder. | +| crypto | [ssh_decoder](https://github.com/jjyg/ssh_decoder) | A tool for decoding ssh traffic. You will need `ruby1.8` from `https://launchpad.net/~brightbox/+archive/ubuntu/ruby-ng` to run this. Run with `ssh_decoder --help` for help, as running it with no arguments causes it to crash. | | crypto | [sslsplit](https://github.com/droe/sslsplit) | SSL/TLS MITM. | | crypto | [python-paddingoracle](https://github.com/mwielgoszewski/python-paddingoracle) | Padding oracle attack automation. | | crypto | [xortool](https://github.com/hellman/xortool) | XOR analysis tool. | @@ -106,6 +109,14 @@ The install script should create a `bin` directory and put its executables there These executables will be automatically linked into the main `bin` directory for the repo. They could be launched from any directory, so don't make assumptions about the location of `$0`! +## License + +The individual tools are all licensed under their own licenses. +As for ctf-tools itself, it is "starware". +If you find it useful, star it on github (https://github.com/zardus/ctf-tools). + +Good luck! + # See Also There's a curated list of CTF tools, but without installers, here: https://github.com/apsdehal/awesome-ctf. diff --git a/exetractor/install b/exetractor/install new file mode 100755 index 0000000..8e38652 --- /dev/null +++ b/exetractor/install @@ -0,0 +1,8 @@ +#!/bin/bash -e + +git clone https://github.com/kholia/exetractor-clone.git + +mkdir bin +cd bin +ln -s ../exetractor-clone/ArchiveViewer.py ../exetractor-clone/ArchiveExtractor.py ../exetractor-clone/exetractor.py . +cd .. diff --git a/foresight/install b/foresight/install new file mode 100755 index 0000000..b00c4bb --- /dev/null +++ b/foresight/install @@ -0,0 +1,13 @@ +#!/bin/bash -e + +git clone https://github.com/ALSchwalm/foresight.git + +# python3 virtualenv +virtualenv -p $(which python3) python3 +source python3/bin/activate +pip install -e foresight + +mkdir -p bin +cd bin +ln -s ../python3/bin/foresee . +cd .. diff --git a/msieve/install-root b/msieve/install-root new file mode 100644 index 0000000..961487e --- /dev/null +++ b/msieve/install-root @@ -0,0 +1,3 @@ +#!/bin/bash -e + +apt-get -y install libgmp3-dev diff --git a/sonic-visualizer/install b/sonic-visualizer/install index 8ddc8c3..123a07b 100755 --- a/sonic-visualizer/install +++ b/sonic-visualizer/install @@ -2,7 +2,7 @@ INST_DIR=$PWD -wget -O - https://code.soundsoftware.ac.uk/attachments/download/1185/sonic-visualiser-2.4.1.tar.gz | tar xz +wget --no-check-certificate -O - https://code.soundsoftware.ac.uk/attachments/download/1185/sonic-visualiser-2.4.1.tar.gz | tar xz cd sonic-visualiser-2.4.1 ./configure --prefix=$INST_DIR make -j diff --git a/ssh_decoder/install b/ssh_decoder/install new file mode 100755 index 0000000..d2625fb --- /dev/null +++ b/ssh_decoder/install @@ -0,0 +1,9 @@ +#!/bin/bash -e + +git clone https://github.com/jjyg/ssh_decoder.git +chmod 755 ssh_decoder/ssh_decoder.rb + +mkdir bin +cd bin +ln -s ../ssh_decoder/ssh_decoder.rb ssh_decoder +cd ..