└── README.md /README.md: -------------------------------------------------------------------------------- 1 | # CTF Tools 2 | ## Audio 3 | [Audacity](http://www.fosshub.com/Audacity.html/audacity-win-2.1.0.exe) - Windows version - Allows for analysis of audio files. 4 | 5 | [WaoN](http://kichiki.github.io/waon/index.html) - Windows/Linux - command line tool that takes in sound files and outputs midi files 6 | 7 | [MidiSheetMusic](http://sourceforge.net/projects/midisheetmusic/?source=typ_redirect) - Windows - Translates Midi files to 1) Sheet Music, and 2) Letter Notes 8 | 9 | ## Bruteforcing 10 | [John the Ripper (Magnum)](https://github.com/magnumripper/JohnTheRipper) - Brute force passwords 11 | 12 | ## Cryptography 13 | [rsatool.py](https://github.com/ius/rsatool) - Takes p and q and returns a private key 14 | 15 | [xortool](https://github.com/hellman/xortool) - Tries to find the key for xor encrypted data 16 | 17 | ## Exploitation 18 | [PEDA](https://github.com/longld/peda) - Irreplaceable addition to GDB. Adds a lot of useful features for finding and exploiting bugs in binaries. 19 | 20 | [ROPGadget](https://github.com/JonathanSalwan/ROPgadget) - Finds gadgets in programs. For use with ROP exploits. 21 | 22 | [pwntools](https://github.com/Gallopsled/pwntools) - Very useful when coding remote exploits for CTFs. Has a feature rich library that aims at making exploit developement for CTFs easier. Definitely check this one out. 23 | 24 | ## Forensics 25 | [Wireshark](https://www.wireshark.org/download.html) - The standard pcap analysis tool. Displays network traffic. 26 | 27 | [pcapfix](https://github.com/Rup0rt/pcapfix) - Fixes corrupt pcap files. 28 | 29 | [aircrack-ng](http://www.aircrack-ng.org/) - WEP and WPA-PSK cracking tool (uses pcap files). 30 | 31 | [HxD](http://mh-nexus.de/en/downloads.php?product=HxD) - Windows - Freeware Hex and Disk Editor. 32 | 33 | [HexEdit](http://www.hexedit.com/download.htm) - Windows - Another Hex Editor. 34 | 35 | [binwalk](http://binwalk.org/) - Linux/OSX - Firmware analysis tool. 36 | 37 | ## Reverse Engineering 38 | [Java Decompiler](http://jd.benow.ca/) - Useful when needing to decompile Java class files. 39 | 40 | [IDA](https://www.hex-rays.com/products/ida/support/download.shtml) - The standard decompiler. 41 | 42 | [Radare2](https://github.com/radare/radare2) - Seems like a better GDB. There appears to be a slight learning curve but this looks promising. 43 | 44 | [VB Decompiler](https://www.vb-decompiler.org/download.htm) - This program will take a VB program and give you a decent amount of information about it. Helpful for seeing the code inside of forms. 45 | 46 | ## Steganography 47 | [Stegsolve](https://www.wechall.net/de/forum/show/thread/527/Stegsolve_1.3/) - Displays various aspects of pictures. 48 | 49 | [Steganabara](http://www.caesum.com/handbook/steganabara-1.1.1.tar.gz) - Provides additional tools for analyzing pictures. 50 | 51 | [binwalk](http://binwalk.org/) - Linux/OSX - See binwalk in Forensics. Also capable of retrieving embedded photos. 52 | 53 | ## Web 54 | [Burp Suite](http://portswigger.net/burp/download.html) - Web proxy. Very helpful for web challenges. 55 | 56 | [sqlmap](http://sqlmap.org/) - This helps automate easy SQL injection challenges. Most CTFs try to prevent the brute force approach but this should be useful for the easier challenges. 57 | 58 | [Postman](https://chrome.google.com/webstore/detail/postman/fhbjgbiflinjbdggehcddcbncdddomop?hl=en) - Chrome Extension - Create and send POST requests from within Chrome. 59 | 60 | [Tamper Data](https://addons.mozilla.org/En-us/firefox/addon/tamper-data/) - Firefox add-on - Intercept, tamper with, and resend POST requests from within Firefox. 61 | --------------------------------------------------------------------------------