From a9b61bbd47b15f37db09705692d54128116653ae Mon Sep 17 00:00:00 2001 From: raildex1 Date: Tue, 22 Sep 2015 00:01:12 +1000 Subject: [PATCH 1/8] Fix wget command to ignore certificate --- sonic-visualizer/install | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/sonic-visualizer/install b/sonic-visualizer/install index 8ddc8c3..78231e2 100755 --- a/sonic-visualizer/install +++ b/sonic-visualizer/install @@ -2,7 +2,7 @@ INST_DIR=$PWD -wget -O - https://code.soundsoftware.ac.uk/attachments/download/1185/sonic-visualiser-2.4.1.tar.gz | tar xz +wget --no-check-certificate https://code.soundsoftware.ac.uk/attachments/download/1185/sonic-visualiser-2.4.1.tar.gz | tar xz cd sonic-visualiser-2.4.1 ./configure --prefix=$INST_DIR make -j From ea5eef7f781b330054bbf293936a5d9900d1cf8a Mon Sep 17 00:00:00 2001 From: Yan Date: Thu, 24 Sep 2015 13:31:21 -0700 Subject: [PATCH 2/8] whoops --- sonic-visualizer/install | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/sonic-visualizer/install b/sonic-visualizer/install index 78231e2..123a07b 100755 --- a/sonic-visualizer/install +++ b/sonic-visualizer/install @@ -2,7 +2,7 @@ INST_DIR=$PWD -wget --no-check-certificate https://code.soundsoftware.ac.uk/attachments/download/1185/sonic-visualiser-2.4.1.tar.gz | tar xz +wget --no-check-certificate -O - https://code.soundsoftware.ac.uk/attachments/download/1185/sonic-visualiser-2.4.1.tar.gz | tar xz cd sonic-visualiser-2.4.1 ./configure --prefix=$INST_DIR make -j From 0b941a228b65ee171820ceda336fa00f936e6c37 Mon Sep 17 00:00:00 2001 From: raildex1 Date: Mon, 28 Sep 2015 12:40:22 +0000 Subject: [PATCH 3/8] Create install-root Add needed dependency on Kali and any other Linux OS. --- msieve/install-root | 3 +++ 1 file changed, 3 insertions(+) create mode 100644 msieve/install-root diff --git a/msieve/install-root b/msieve/install-root new file mode 100644 index 0000000..961487e --- /dev/null +++ b/msieve/install-root @@ -0,0 +1,3 @@ +#!/bin/bash -e + +apt-get -y install libgmp3-dev From eeae2f67b3639cd90098717e3adc190f7f85dc06 Mon Sep 17 00:00:00 2001 From: Yan Date: Tue, 13 Oct 2015 17:04:53 -0700 Subject: [PATCH 4/8] starware! --- README.md | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/README.md b/README.md index 233c4e7..760c581 100644 --- a/README.md +++ b/README.md @@ -106,6 +106,14 @@ The install script should create a `bin` directory and put its executables there These executables will be automatically linked into the main `bin` directory for the repo. They could be launched from any directory, so don't make assumptions about the location of `$0`! +## License + +The individual tools are all licensed under their own licenses. +As for ctf-tools itself, it is "starware". +If you find it useful, star it on github (https://github.com/zardus/ctf-tools). + +Good luck! + # See Also There's a curated list of CTF tools, but without installers, here: https://github.com/apsdehal/awesome-ctf. From 668b88a459ed58ff0c113e2c156d5a7e2bb3c782 Mon Sep 17 00:00:00 2001 From: Yan Date: Sat, 24 Oct 2015 20:52:24 -0700 Subject: [PATCH 5/8] added foresee, used for crypto100 for whitehat gp 2015 --- README.md | 1 + foresight/install | 13 +++++++++++++ 2 files changed, 14 insertions(+) create mode 100755 foresight/install diff --git a/README.md b/README.md index 760c581..5accb3e 100644 --- a/README.md +++ b/README.md @@ -36,6 +36,7 @@ Installers for the following tools are included: | forensics | [pdf-parser](http://blog.didierstevens.com/programs/pdf-tools/) | Tool for digging in PDF files | | forensics | [scrdec](https://gist.github.com/bcse/1834878) | A decoder for encoded Windows Scripts. | | crypto | [cribdrag](https://github.com/SpiderLabs/cribdrag) | Interactive crib dragging tool (for crypto). | +| crypto | [foresight](https://github.com/ALSchwalm/foresee) | A tool for predicting the output of random number generators. To run, launch "foresee". | | crypto | [hashpump](https://github.com/bwall/HashPump) | A tool for performing hash length extension attaacks. | | crypto | [hashpump-partialhash](https://github.com/mheistermann/HashPump-partialhash) | Hashpump, supporting partially-unknown hashes. | | crypto | [hash-identifier](https://code.google.com/p/hash-identifier/source/checkout) | Simple hash algorithm identifier. | diff --git a/foresight/install b/foresight/install new file mode 100755 index 0000000..a269c07 --- /dev/null +++ b/foresight/install @@ -0,0 +1,13 @@ +#!/bin/bash -e + +git clone git@github.com:ALSchwalm/foresight.git + +# python3 virtualenv +virtualenv -p $(which python3) python3 +source python3/bin/activate +pip install -e foresight + +mkdir -p bin +cd bin +ln -s ../python3/bin/foresee . +cd .. From 98c3b7db00a3282268e63abace399f46175407ab Mon Sep 17 00:00:00 2001 From: Yan Date: Sat, 24 Oct 2015 20:54:06 -0700 Subject: [PATCH 6/8] let's use https --- foresight/install | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/foresight/install b/foresight/install index a269c07..b00c4bb 100755 --- a/foresight/install +++ b/foresight/install @@ -1,6 +1,6 @@ #!/bin/bash -e -git clone git@github.com:ALSchwalm/foresight.git +git clone https://github.com/ALSchwalm/foresight.git # python3 virtualenv virtualenv -p $(which python3) python3 From 4348cec3cf5c57db5482eef1fe706988ca6f300d Mon Sep 17 00:00:00 2001 From: Yan Date: Sat, 24 Oct 2015 20:58:24 -0700 Subject: [PATCH 7/8] added ssh_decoder, used for forensics 400 for whitehat gp 2015 --- README.md | 1 + ssh_decoder/install | 9 +++++++++ 2 files changed, 10 insertions(+) create mode 100755 ssh_decoder/install diff --git a/README.md b/README.md index 5accb3e..21b8ab6 100644 --- a/README.md +++ b/README.md @@ -43,6 +43,7 @@ Installers for the following tools are included: | crypto | [littleblackbox](https://github.com/devttys0/littleblackbox) | Database of private SSL/SSH keys for embedded devices. | | crypto | [pemcrack](https://github.com/robertdavidgraham/pemcrack) | SSL PEM file cracker. | | crypto | [reveng](http://reveng.sourceforge.net/) | CRC finder. | +| crypto | [ssh_decoder](https://github.com/jjyg/ssh_decoder) | A tool for decoding ssh traffic. You will need `ruby1.8` from `https://launchpad.net/~brightbox/+archive/ubuntu/ruby-ng` to run this. Run with `ssh_decoder --help` for help, as running it with no arguments causes it to crash. | | crypto | [sslsplit](https://github.com/droe/sslsplit) | SSL/TLS MITM. | | crypto | [python-paddingoracle](https://github.com/mwielgoszewski/python-paddingoracle) | Padding oracle attack automation. | | crypto | [xortool](https://github.com/hellman/xortool) | XOR analysis tool. | diff --git a/ssh_decoder/install b/ssh_decoder/install new file mode 100755 index 0000000..d2625fb --- /dev/null +++ b/ssh_decoder/install @@ -0,0 +1,9 @@ +#!/bin/bash -e + +git clone https://github.com/jjyg/ssh_decoder.git +chmod 755 ssh_decoder/ssh_decoder.rb + +mkdir bin +cd bin +ln -s ../ssh_decoder/ssh_decoder.rb ssh_decoder +cd .. From 3e06371c0a63dfd6b219ceb52796c49d50c2b5bb Mon Sep 17 00:00:00 2001 From: Yan Date: Sat, 24 Oct 2015 21:02:28 -0700 Subject: [PATCH 8/8] exetractor for unpacking packed python executables --- README.md | 1 + exetractor/install | 8 ++++++++ 2 files changed, 9 insertions(+) create mode 100755 exetractor/install diff --git a/README.md b/README.md index 21b8ab6..4ffe573 100644 --- a/README.md +++ b/README.md @@ -31,6 +31,7 @@ Installers for the following tools are included: | binary | [rp++](https://github.com/0vercl0k/rp) | Another gadget finder. | | forensics | [binwalk](https://github.com/devttys0/binwalk.git) | Firmware (and arbitrary file) analysis tool. | | forensics | [dislocker](http://www.hsc.fr/ressources/outils/dislocker/) | Tool for reading Bitlocker encrypted partitions. | +| forensics | [exetractor](https://github.com/kholia/exetractor-clone) | Unpacker for packed Python executables. Supports PyInstaller and py2exe. | | forensics | [firmware-mod-kit](https://code.google.com/p/firmware-mod-kit/) | Tools for firmware packing/unpacking. | | forensics | [testdisk](http://www.cgsecurity.org/wiki/TestDisk) | Testdisk and photorec for file recovery. | | forensics | [pdf-parser](http://blog.didierstevens.com/programs/pdf-tools/) | Tool for digging in PDF files | diff --git a/exetractor/install b/exetractor/install new file mode 100755 index 0000000..8e38652 --- /dev/null +++ b/exetractor/install @@ -0,0 +1,8 @@ +#!/bin/bash -e + +git clone https://github.com/kholia/exetractor-clone.git + +mkdir bin +cd bin +ln -s ../exetractor-clone/ArchiveViewer.py ../exetractor-clone/ArchiveExtractor.py ../exetractor-clone/exetractor.py . +cd ..