# ctf-tools [![Build Status](https://travis-ci.org/zardus/ctf-tools.svg?branch=master)](https://travis-ci.org/zardus/ctf-tools) [![IRC](https://img.shields.io/badge/freenode-%23ctf--tools-green.svg)](http://webchat.freenode.net/?channels=#ctf-tools) This is a collection of setup scripts to create an install of various security research tools. Of course, this isn't a hard problem, but it's really nice to have them in one place that's easily deployable to new machines and so forth. Installers for the following tools are included: | Category | Tool | Description | |----------|------|-------------| | binary | [afl](http://lcamtuf.coredump.cx/afl/) | State-of-the-art fuzzer. | | binary | [angr](http://angr.io) | Next-generation binary analysis engine from Shellphish. | | binary | [barf](https://github.com/programa-stic/barf-project) | Binary Analysis and Reverse-engineering Framework. | | binary | [bindead](https://bitbucket.org/mihaila/bindead/wiki/Home) | A static analysis tool for binaries. | | binary | [binjitsu](https://github.com/binjitsu/binjitsu) | Useful CTF utilities. pwntools fork. | | binary | [checksec](https://github.com/slimm609/checksec.sh) | Check binary hardening settings. | | binary | [codereason](https://github.com/trailofbits/codereason) | Semantic Binary Code Analysis Framework. | | binary | [crosstool-ng](http://crosstool-ng.org/) | Cross-compilers and cross-architecture tools. | | binary | [cross2](http://kozos.jp/books/asm/asm.html) | A set of cross-compilation tools from a Japanese book on C. | | binary | [elfkickers](http://www.muppetlabs.com/~breadbox/software/elfkickers.html) | A set of utilities for working with ELF files. | | binary | [elfparser](http://www.elfparser.com/) | Quickly determine the capabilities of an ELF binary through static analysis. | | binary | [evilize](http://www.mathstat.dal.ca/~selinger/md5collision/) | Tool to create MD5 colliding binaries | | binary | [gdb](http://www.gnu.org/software/gdb/) | Up-to-date gdb with python2 bindings. | | binary | [gef](https://github.com/hugsy/gef) | Enhanced environment for gdb. | | binary | [hongfuzz](https://github.com/google/honggfuzz) | A general-purpose, easy-to-use fuzzer with interesting analysis options. | | binary | [panda](https://github.com/moyix/panda) | Platform for Architecture-Neutral Dynamic Analysis. | | binary | [pathgrind](https://github.com/codelion/pathgrind) | Path-based, symbolically-assisted fuzzer. | | binary | [peda](https://github.com/longld/peda) | Enhanced environment for gdb. | | binary | [preeny](https://github.com/zardus/preeny) | A collection of helpful preloads (compiled for many architectures!). | | binary | [pwndbg](https://github.com/zachriggle/pwndbg) | Enhanced environment for gdb. Especially for pwning. | | binary | [pwntools](https://github.com/Gallopsled/pwntools) | Useful CTF utilities. | | binary | [python-pin](https://github.com/blankwall/Python_Pin) | Python bindings for pin. | | binary | [qemu](http://qemu.org) | Latest version of qemu! | | binary | [qira](http://qira.me) | Parallel, timeless debugger. | | binary | [radare2](http://www.radare.org/) | Some crazy thing crowell likes. | | binary | [ropper](https://github.com/sashs/Ropper) | Another gadget finder. | | binary | [rp++](https://github.com/0vercl0k/rp) | Another gadget finder. | | binary | [shellnoob](https://github.com/reyammer/shellnoob) | Shellcode writing helper. | | binary | [shellsploit](https://github.com/b3mb4m/shellsploit-framework) | Shellcode development kit. | | binary | [snowman](https://github.com/yegord/snowman) | Cross-architecture decompiler. | | binary | [taintgrind](https://github.com/wmkhoo/taintgrind) | A valgrind taint analysis tool. | | binary | [villoc](https://github.com/wapiflapi/villoc) | Visualization of heap operations. | | binary | [virtualsocket](https://github.com/antoniobianchi333/virtualsocket) | A nice library to interact with binaries. | | binary | [xrop](https://github.com/acama/xrop) | Gadget finder. | | forensics | [binwalk](https://github.com/devttys0/binwalk.git) | Firmware (and arbitrary file) analysis tool. | | forensics | [dislocker](http://www.hsc.fr/ressources/outils/dislocker/) | Tool for reading Bitlocker encrypted partitions. | | forensics | [exetractor](https://github.com/kholia/exetractor-clone) | Unpacker for packed Python executables. Supports PyInstaller and py2exe. | | forensics | [firmware-mod-kit](https://code.google.com/p/firmware-mod-kit/) | Tools for firmware packing/unpacking. | | forensics | [pdf-parser](http://blog.didierstevens.com/programs/pdf-tools/) | Tool for digging in PDF files | | forensics | [peepdf](https://github.com/jesparza/peepdf) | Powerful Python tool to analyze PDF documents. | | forensics | [scrdec](https://gist.github.com/bcse/1834878) | A decoder for encoded Windows Scripts. | | forensics | [testdisk](http://www.cgsecurity.org/wiki/TestDisk) | Testdisk and photorec for file recovery. | | crypto | [cribdrag](https://github.com/SpiderLabs/cribdrag) | Interactive crib dragging tool (for crypto). | | crypto | [foresight](https://github.com/ALSchwalm/foresight) | A tool for predicting the output of random number generators. To run, launch "foresee". | | crypto | [hashkill](https://github.com/gat3way/hashkill) | Hash cracker. | | crypto | [hashpump](https://github.com/bwall/HashPump) | A tool for performing hash length extension attaacks. | | crypto | [hashpump-partialhash](https://github.com/mheistermann/HashPump-partialhash) | Hashpump, supporting partially-unknown hashes. | | crypto | [hash-identifier](https://code.google.com/p/hash-identifier/source/checkout) | Simple hash algorithm identifier. | | crypto | [littleblackbox](https://github.com/devttys0/littleblackbox) | Database of private SSL/SSH keys for embedded devices. | | crypto | [msieve](http://sourceforge.net/projects/msieve/) | Msieve is a C library implementing a suite of algorithms to factor large integers. | | crypto | [pemcrack](https://github.com/robertdavidgraham/pemcrack) | SSL PEM file cracker. | | crypto | [pkcrack](https://www.unix-ag.uni-kl.de/~conrad/krypto/pkcrack.html) | PkZip encryption cracker. | | crypto | [python-paddingoracle](https://github.com/mwielgoszewski/python-paddingoracle) | Padding oracle attack automation. | | crypto | [reveng](http://reveng.sourceforge.net/) | CRC finder. | | crypto | [ssh_decoder](https://github.com/jjyg/ssh_decoder) | A tool for decoding ssh traffic. You will need `ruby1.8` from `https://launchpad.net/~brightbox/+archive/ubuntu/ruby-ng` to run this. Run with `ssh_decoder --help` for help, as running it with no arguments causes it to crash. | | crypto | [sslsplit](https://github.com/droe/sslsplit) | SSL/TLS MITM. | | crypto | [xortool](https://github.com/hellman/xortool) | XOR analysis tool. | | crypto | [yafu](http://sourceforge.net/projects/yafu/) | Automated integer factorization. | | web | [burpsuite](http://portswigger.net/burp) | Web proxy to do naughty web stuff. | | web | [commix](https://github.com/stasinopoulos/commix) | Command injection and exploitation tool. | | web | [dirb](http://dirb.sourceforge.net/) | Web path scanner. | | web | [dirsearch](https://github.com/maurosoria/dirsearch) | Web path scanner. | | web | [mitmproxy](https://mitmproxy.org/) | CLI Web proxy and python library. | | web | [sqlmap](http://sqlmap.org/) | SQL injection automation engine. | | web | [subbrute](https://github.com/TheRook/subbrute) | A DNS meta-query spider that enumerates DNS records, and subdomains. | | stego | [sound-visualizer](http://www.sonicvisualiser.org/) | Audio file visualization. | | stego | [steganabara](http://www.caesum.com/handbook/stego.htm) | Another image steganography solver. | | stego | [stegdetect](http://www.outguess.org/) | Steganography detection/breaking tool. | | stego | [stegsolve](http://www.caesum.com/handbook/stego.htm) | Image steganography solver. | | android | [apktool](https://ibotpeaches.github.io/Apktool/) | Dissect, dis-assemble, and re-pack Android APKs | | android | [android-sdk](http://developer.android.com/sdk) | The android SDK (adb, emulator, etc). | There are also some installers for non-CTF stuff to break the monotony! | Category | Tool | Description | |----------|------|-------------| | game | [Dwarf Fortress](http://www.bay12games.com/dwarves/) | Something to help you relax after a CTF! | | tor-browser | [tor-browser](https://www.torproject.org/projects/torbrowser.html.en) | Useful when you need to hit a web challenge from different IPs. | | pyvmmonitor | [pyvmmonitor](http://www.pyvmmonitor.com/) | PyVmMonitor is a profiler with a simple goal: being the best way to profile a Python program. | ## Usage To use, do: ```bash # set up the path /path/to/ctf-tools/bin/manage-tools setup source ~/.bashrc # list the available tools manage-tools list # install gdb, allowing it to try to sudo install dependencies manage-tools -s install gdb # install pwntools, but don't let it sudo install dependencies manage-tools install pwntools # uninstall gdb manage-tools uninstall gdb # uninstall all tools manage-tools uninstall all # search for a tool manage-tools search preload ``` Where possible, the tools keep the installs very self-contained (i.e., in to tool/ directory), and most uninstalls are just calls to `git clean` (**NOTE**, this is **NOT** careful; everything under the tool directory, including whatever you were working on, is blown away during an uninstall). One exception to this are python tools, which are installed using the `pip` package manager if possible. A `ctftools` virtualenv is created during the `manage-tools setup` command and can be accessed using the command `workon ctftools`. ## Help! Something not working? I didn't write (almost) any of these tools, but hit up [#ctf-tools on freenode](http://webchat.freenode.net/?channels=#ctf-tools) if you're desperate. Maybe some kind soul will help! ## Docker (version 1.7+) By popular demand, a Dockerfile has been included. You can build a docker image with: ```bash git clone https://github.com/zardus/ctf-tools docker build -t ctf-tools . ``` And run it with: ```bash docker run -it ctf-tools ``` The built image will have ctf-tools cloned and ready to go, but you will still need to install the tools themselves (see above). ## Vagrant You can build a Vagrant VM with: ```bash wget https://raw.githubusercontent.com/zardus/ctf-tools/master/Vagrantfile vagrant up ``` And connect to it via: ```bash vagrant ssh ``` ## Adding Tools To add a tool (say, named *toolname*), do the following: 1. Create a `toolname` directory. 2. Create an `install` script. 3. (optional) if special uninstall steps are required, create an `uninstall` script. ### Install Scripts The install script will be run with `$PWD` being `toolname`. It should install the tool into this directory, in as contained a manner as possible. Ideally, full uninstallation should be possible with a `git clean`. The install script should create a `bin` directory and put its executables there. These executables will be automatically linked into the main `bin` directory for the repo. They could be launched from any directory, so don't make assumptions about the location of `$0`! ## License The individual tools are all licensed under their own licenses. As for ctf-tools itself, it is "starware". If you find it useful, star it on github (https://github.com/zardus/ctf-tools). Good luck! # See Also There's a curated list of CTF tools, but without installers, here: https://github.com/apsdehal/awesome-ctf. There's a Vagrant config with a lot of the bigger frameworks here: https://github.com/thebarbershopper/epictreasure. ## Tools in the official Debian/Ubuntu repos These tools are present in the Debian or Ubuntu repos (in an adequately new version). They're not included in ctf-tools, but are included here as notes for the author. | Category | Package | Description | Package | |----------|---------|-------------|---------| | forensics | [foremost](http://foremost.sourceforge.net/) | File carver. | `foremost` | | dsniff | [dsniff](http://www.monkey.org/~dugsong/dsniff/) | Grabs passwords and other data from pcaps/network streams. | dsniff | ## Tools with unofficial Debian/Ubuntu repos or debs | Category | Package | Description | Repo/deb | |----------|---------|-------------|----------| | stego | [sound-visualizer](http://www.sonicvisualiser.org/) | Audio file visualization. | [deb](http://www.sonicvisualiser.org/download.html) |