Skip to content

Latest commit

 

History

History
109 lines (91 loc) · 7.08 KB

README.md

File metadata and controls

109 lines (91 loc) · 7.08 KB

CTF Tools

Primarily for tools used to solve CTF challenges

Contributing

As you learn how to use new tools that could be useful for CTF's please add them here

Things you may want to consider adding with your contribution

  • Short details of the challenge it helped solve
  • Command line arguments and how you used them
  • Use links for useful webpages instead of their homepage
  • Anything else you think could be helpful

All Around Tools

  • CyberChef - All around usage tool for transforming data
  • Ciphey - Commandline tool that attempts to automatically determine a cipher and output the result.
  • Wireshark - Analyze the network dumps.

PWN

Interactions

  • pwntools - Python library for interacting with challenges, has extensions for python 2.7 and 3+
    • Has modules for ssh, nc, gdb, loading binaries for rop and disassembly
    • Used in most writeups or the code for writeups relating to pwning

Debuggers and Extensions

  • GDB - The GNU project debugger
  • GEF - GDB Enhanced Features GDB plugin that is like PEDA but all source is in one file and is better
  • PEDA - GDB plugin (only python2.7)

Disasemblers/Decompilers

  • Binary Ninja - Binary analysis framework
  • Ghidra - Open Source suite of reverse engineering tools. Similar to IDA Pro.
  • Hopper - Reverse engineering tool (disassembler) for OSX and Linux
  • IDA Pro - Most used Reversing software
  • Jadx - Decompile Android files
  • Java Decompilers - An online decompiler for Java and Android APKs
  • Krakatau - Java decompiler and disassembler
  • radare2 - A portable reversing framework

Exploits

  • DLLInjector - Inject dlls in processes
  • libformatstr - Simplify format string exploitation.
  • Metasploit - Penetration testing software
  • one_gadget - A tool to find the one gadget execve('/bin/sh', NULL, NULL) call
    • gem install one_gadget
  • Pwntools - CTF Framework for writing exploits
  • Qira - QEMU Interactive Runtime Analyser
  • ROP Gadget - Framework for ROP exploitation
  • V0lt - Security CTF Toolkit

Web

Proxy

  • BurpSuite - A graphical tool to testing website security.
  • OWASP ZAP - Intercepting proxy to replay, debug, and fuzz HTTP requests and responses

Other

  • SQLMap - Automatic SQL injection and database takeover tooli
  • W3af - Web Application Attack and Audit Framework.
  • XSSer - Automated XSS testor
  • Nikto - Open Source (GPL) web server scanner which performs comprehensive tests against web servers
  • JSONBee - A ready to use JSONP endpoints to help bypass content security policy of different websites.
  • Google CSP Evaluator - CSP Evaluator allows developers and security experts to check if a Content Security Policy (CSP) serves as a strong mitigation against cross-site scripting attacks.

Networking

  • Bettercap - Framework to perform MITM (Man in the Middle) attacks.
  • Wireshark - Analyze the network dumps.
  • tshark - Analyze dumps from the commandline.
  • NetworkMiner - Nice auto gui for Network Traffic Analysis. Good for finding files and sessions.

Cryptography

  • FeatherDuster - An automated, modular cryptanalysis tool
  • Hash Extender - A utility tool for performing hash length extension attacks
  • PkCrack - A tool for Breaking PkZip-encryption
  • fcrackzip - a Free/Fast Zip Password Cracker
  • RSACTFTool - A tool for recovering RSA private key with various attack
  • RSATool - Generate private key with knowledge of p and q
  • XORTool - A tool to analyze multi-byte xor cipher

Stegonagraphy

  • Stego Checklist - Checklist for solving stego challenges
  • StegOnline - Stego solver
  • steghide - hides and extracts data from files.
  • stegdetect - Runs statistical tests to determine if steganographic content is present and tries to figure out how.
  • Binwalk - Can be used to search a given binary image for embedded files and executable code.
  • foremost - Navy's version of Binwalk (may catch something binwalk misses)
  • stegsolve - Can be used to find hidden information in files
    • Used to solve a hackthebox stego challenge
  • zsteg - Can be used to find steganography in png and bmp files
    • Used during affinity CTF to find hidden information
  • stegoveritas - Similar to zsteg
    • Used during affinity CTF to find hidden information

Forensics

  • volatility - Common forensics tool for system memory dumps (can be finiky)
  • pspy - Low privilege process snooper

OSINT/Trivia

  • Google dorking - Using google to find things you shouldn't.
  • Shodan - Online webscanner service (note you do not have permission to view actual services; BE CAREFUL)
  • Censys - Online scanner for websites and certificates

Misc

  • Webhook Tester - Useful for getting web requests to a public site without creating one
  • wiggle - Online wardriving site. Gives access to wifi network information across the contry
    • used on NCL past 2 seasons