No description
Find a file
2017-02-19 00:38:59 +01:00
afl detect xenial and act accordingly. lsb-release should be installed to 2017-02-16 22:43:10 +01:00
android-sdk detect xenial and act accordingly. lsb-release should be installed to 2017-02-16 22:43:10 +01:00
angr fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
apktool fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
barf fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
beef fix apt-get commands 2017-02-19 00:30:51 +01:00
bin fix travis-ci.sh permission 2017-02-19 00:38:59 +01:00
bindead detect xenial and act accordingly. lsb-release should be installed to 2017-02-16 22:43:10 +01:00
binwalk fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
burpsuite detect xenial and act accordingly. lsb-release should be installed to 2017-02-16 22:43:10 +01:00
capstone fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
checksec fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
codereason bunch of fixes to get things to build 2017-02-16 22:45:02 +01:00
commix fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
cribdrag fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
cross2 fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
crosstool fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
df fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
dirb fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
dirsearch fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
dislocker bunch of fixes to get things to build 2017-02-16 22:45:02 +01:00
elfkickers fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
elfparser fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
evilize fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
exetractor fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
featherduster fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
firmware-mod-kit fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
foresight fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
gdb fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
gdb-heap fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
gef fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
hash-identifier fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
hashkill fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
hashpump fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
hashpump-partialhash fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
honggfuzz fix apt-get commands 2017-02-19 00:30:51 +01:00
jdgui detect xenial and act accordingly. lsb-release should be installed to 2017-02-16 22:43:10 +01:00
keystone fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
libheap fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
littleblackbox fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
mitmproxy fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
msieve fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
panda fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
pathgrind fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
pdf-parser fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
peda fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
peepdf fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
pemcrack fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
pkcrack fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
preeny fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
pwndbg fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
pwntools fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
python-paddingoracle fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
python-pin fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
pyvmmonitor fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
qemu fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
qira fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
radare2 fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
reveng fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
ropper fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
rp++ fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
scrdec18 fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
shellnoob fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
shellsploit fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
snowman fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
sonic-visualizer fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
sqlmap bunch of fixes to get things to build 2017-02-16 22:45:02 +01:00
ssh_decoder fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
sslsplit fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
steganabara fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
stegdetect bunch of fixes to get things to build 2017-02-16 22:45:02 +01:00
stegsolve fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
subbrute fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
taintgrind fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
testdisk fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
tor-browser fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
unicorn fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
veles fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
villoc fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
virtualsocket fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
wcc fix apt-get commands 2017-02-19 00:30:51 +01:00
xortool fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
xrop bunch of fixes to get things to build 2017-02-16 22:45:02 +01:00
xspy fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
yafu fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
z3 fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
zsteg fail hard on any error + verify that all scripts use bash -ex to fail 2017-02-16 22:40:17 +01:00
.dockerignore dockerfile 2015-11-03 18:27:49 -08:00
.gitignore Split install-root scripts into distribution specific ones 2016-06-06 15:11:08 +02:00
.travis.yml combine tools in travis-ci tests, add archlinux and fedora builds 2017-02-19 00:33:12 +01:00
Dockerfile use CMD instead of ENTRYPOINT so we can execute other commands with docker run 2017-02-16 22:46:25 +01:00
Dockerfile.archlinux Added Dockerfile for archlinux based container. 2016-06-06 18:19:16 +02:00
Dockerfile.fedora combine tools in travis-ci tests, add archlinux and fedora builds 2017-02-19 00:33:12 +01:00
Dockerfile.xenial Dockerfile for xenial 2017-02-16 22:47:00 +01:00
README.md add xspy 2017-01-20 15:02:52 -08:00
TODO Update TODO 2015-10-29 16:24:49 +11:00
Vagrantfile Add Vagrantfile 2015-12-18 00:04:37 -08:00

ctf-tools

Build Status IRC

This is a collection of setup scripts to create an install of various security research tools. Of course, this isn't a hard problem, but it's really nice to have them in one place that's easily deployable to new machines and so forth.

Installers for the following tools are included:

Category Tool Description
binary afl State-of-the-art fuzzer.
binary angr Next-generation binary analysis engine from Shellphish.
binary barf Binary Analysis and Reverse-engineering Framework.
binary bindead A static analysis tool for binaries.
binary checksec Check binary hardening settings.
binary codereason Semantic Binary Code Analysis Framework.
binary crosstool-ng Cross-compilers and cross-architecture tools.
binary cross2 A set of cross-compilation tools from a Japanese book on C.
binary elfkickers A set of utilities for working with ELF files.
binary elfparser Quickly determine the capabilities of an ELF binary through static analysis.
binary evilize Tool to create MD5 colliding binaries
binary gdb Up-to-date gdb with python2 bindings.
binary gdb-heap gdb extension for debugging heap issues.
binary gef Enhanced environment for gdb.
binary hongfuzz A general-purpose, easy-to-use fuzzer with interesting analysis options.
binary libheap gdb python library for examining the glibc heap (ptmalloc)
binary panda Platform for Architecture-Neutral Dynamic Analysis.
binary pathgrind Path-based, symbolically-assisted fuzzer.
binary peda Enhanced environment for gdb.
binary preeny A collection of helpful preloads (compiled for many architectures!).
binary pwndbg Enhanced environment for gdb. Especially for pwning.
binary pwntools Useful CTF utilities.
binary python-pin Python bindings for pin.
binary qemu Latest version of qemu!
binary qira Parallel, timeless debugger.
binary radare2 Some crazy thing crowell likes.
binary ropper Another gadget finder.
binary rp++ Another gadget finder.
binary shellnoob Shellcode writing helper.
binary shellsploit Shellcode development kit.
binary snowman Cross-architecture decompiler.
binary taintgrind A valgrind taint analysis tool.
binary villoc Visualization of heap operations.
binary virtualsocket A nice library to interact with binaries.
binary wcc The Witchcraft Compiler Collection is a collection of compilation tools to perform binary black magic on the GNU/Linux and other POSIX platforms.
binary xrop Gadget finder.
forensics binwalk Firmware (and arbitrary file) analysis tool.
forensics dislocker Tool for reading Bitlocker encrypted partitions.
forensics exetractor Unpacker for packed Python executables. Supports PyInstaller and py2exe.
forensics firmware-mod-kit Tools for firmware packing/unpacking.
forensics pdf-parser Tool for digging in PDF files
forensics peepdf Powerful Python tool to analyze PDF documents.
forensics scrdec A decoder for encoded Windows Scripts.
forensics testdisk Testdisk and photorec for file recovery.
crypto cribdrag Interactive crib dragging tool (for crypto).
crypto foresight A tool for predicting the output of random number generators. To run, launch "foresee".
crypto featherduster An automated, modular cryptanalysis tool.
crypto hashkill Hash cracker.
crypto hashpump A tool for performing hash length extension attaacks.
crypto hashpump-partialhash Hashpump, supporting partially-unknown hashes.
crypto hash-identifier Simple hash algorithm identifier.
crypto littleblackbox Database of private SSL/SSH keys for embedded devices.
crypto msieve Msieve is a C library implementing a suite of algorithms to factor large integers.
crypto pemcrack SSL PEM file cracker.
crypto pkcrack PkZip encryption cracker.
crypto python-paddingoracle Padding oracle attack automation.
crypto reveng CRC finder.
crypto ssh_decoder A tool for decoding ssh traffic. You will need ruby1.8 from https://launchpad.net/~brightbox/+archive/ubuntu/ruby-ng to run this. Run with ssh_decoder --help for help, as running it with no arguments causes it to crash.
crypto sslsplit SSL/TLS MITM.
crypto xortool XOR analysis tool.
crypto yafu Automated integer factorization.
web burpsuite Web proxy to do naughty web stuff.
web commix Command injection and exploitation tool.
web dirb Web path scanner.
web dirsearch Web path scanner.
web mitmproxy CLI Web proxy and python library.
web sqlmap SQL injection automation engine.
web subbrute A DNS meta-query spider that enumerates DNS records, and subdomains.
stego sound-visualizer Audio file visualization.
stego steganabara Another image steganography solver.
stego stegdetect Steganography detection/breaking tool.
stego stegsolve Image steganography solver.
stego zsteg detect stegano-hidden data in PNG & BMP.
android apktool Dissect, dis-assemble, and re-pack Android APKs
android android-sdk The android SDK (adb, emulator, etc).
misc xspy Tiny tool to spy on X sessions.
misc z3 Theorem prover from Microsoft Research.
misc jdgui Java decompiler.
misc veles Binary data analysis and visulalization tool.

There are also a couple of installers for useful libraries included. Currently only the python bindings for these libraries are installed.

Category Library Description
binary capstone Multi-architecture disassembly framework.
binary keystone Lightweight multi-architecture assembler framework.
binary unicorn Multi-architecture CPU emulator framework.

There are also some installers for non-CTF stuff to break the monotony!

Category Tool Description
game Dwarf Fortress Something to help you relax after a CTF!
tor-browser tor-browser Useful when you need to hit a web challenge from different IPs.
pyvmmonitor pyvmmonitor PyVmMonitor is a profiler with a simple goal: being the best way to profile a Python program.

Usage

To use, do:

# set up the path
/path/to/ctf-tools/bin/manage-tools setup
source ~/.bashrc

# list the available tools
manage-tools list

# install gdb, allowing it to try to sudo install dependencies
manage-tools -s install gdb

# install pwntools, but don't let it sudo install dependencies
manage-tools install pwntools

# uninstall gdb
manage-tools uninstall gdb

# uninstall all tools
manage-tools uninstall all

# search for a tool
manage-tools search preload

Where possible, the tools keep the installs very self-contained (i.e., in to tool/ directory), and most uninstalls are just calls to git clean (NOTE, this is NOT careful; everything under the tool directory, including whatever you were working on, is blown away during an uninstall). One exception to this are python tools, which are installed using the pip package manager if possible. A ctftools virtualenv is created during the manage-tools setup command and can be accessed using the command workon ctftools.

Help!

Something not working? I didn't write (almost) any of these tools, but hit up #ctf-tools on freenode if you're desperate. Maybe some kind soul will help!

Docker (version 1.7+)

By popular demand, a Dockerfile has been included. You can build a docker image with:

git clone https://github.com/zardus/ctf-tools
docker build -t ctf-tools .

And run it with:

docker run -it ctf-tools

The built image will have ctf-tools cloned and ready to go, but you will still need to install the tools themselves (see above).

Alternatively, you can also pull ctf-tools (with some tools preinstalled) from dockerhub:

docker run -it zardus/ctf-tools

Vagrant

You can build a Vagrant VM with:

wget https://raw.githubusercontent.com/zardus/ctf-tools/master/Vagrantfile
vagrant up

And connect to it via:

vagrant ssh

Kali Linux

Kali Linux (Sana and Rolling), due to manually setting certain libraries to not use the latest version available (sometimes being out of date by years) causes some tools to not install at all, or fail in strange ways. AFL and Panda comes to mind, in fact any tool that uses QEMU 2.30 will probably fail during compilation under Kali. Overriding these libraries breaks other tools included in Kali so your only solution is to either live with some of Kali's tools being broken, or running another distribution seperately such as Ubuntu.

Most tools aren't affected though.

Adding Tools

To add a tool (say, named toolname), do the following:

  1. Create a toolname directory.
  2. Create an install script.
  3. (optional) if special uninstall steps are required, create an uninstall script.

Install Scripts

The install script will be run with $PWD being toolname. It should install the tool into this directory, in as contained a manner as possible. Ideally, full uninstallation should be possible with a git clean.

The install script should create a bin directory and put its executables there. These executables will be automatically linked into the main bin directory for the repo. They could be launched from any directory, so don't make assumptions about the location of $0!

License

The individual tools are all licensed under their own licenses. As for ctf-tools itself, it is "starware". If you find it useful, star it on github (https://github.com/zardus/ctf-tools).

Good luck!

See Also

There's a curated list of CTF tools, but without installers, here: https://github.com/apsdehal/aWEsoMe-cTf.

There's a Vagrant config with a lot of the bigger frameworks here: https://github.com/thebarbershopper/epictreasure.

Tools in the official Debian/Ubuntu repos

These tools are present in the Debian or Ubuntu repos (in an adequately new version). They're not included in ctf-tools, but are included here as notes for the author.

Category Package Description Package
forensics foremost File carver. foremost
dsniff dsniff Grabs passwords and other data from pcaps/network streams. dsniff
stego pngtools PNG's analysis tool.

Tools with unofficial Debian/Ubuntu repos or debs

Category Package Description Repo/deb
stego sound-visualizer Audio file visualization. deb