An open API service indexing awesome lists of open source software.

awesome-ctf-resources

A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩
https://github.com/devploit/awesome-ctf-resources

Last synced: 3 days ago
JSON representation

  • Courses

  • Forensics

    • photorec - File data recovery software designed to recover lost files including video, documents and archives from hard disks, CD-ROMs, and lost pictures (thus the Photo Recovery name) from digital camera memory.
    • Wireshark - Tool to analyze pcap or pcapng files.
    • Forensically - Free online tool to analysis image this tool has many features.
    • Belkasoft RAM Capturer - Volatile Memory Acquisition Tool.
    • ChromeCacheView - Small utility that reads the cache folder of Google Chrome Web browser, and displays the list of all files currently stored in the cache.
    • Exiftool - Read, write and edit file metadata.
    • OfflineRegistryView - Simple tool for Windows that allows you to read offline Registry files from external drive.
    • Autopsy - End-to-end open source digital forensics platform.
    • A-Packets - Effortless PCAP File Analysis in Your Browser.
    • Bkhive & samdump2 - Dump SYSTEM and SAM files.
    • firmware-mod-kit - Modify firmware images without recompiling.
    • Forensic Toolkit - It scans a hard drive looking for various information. It can, potentially locate deleted emails and scan a disk for text strings to use them as a password dictionary to crack encryption.
    • MZCacheView - Small utility that reads the cache folder of Firefox/Mozilla/Netscape Web browsers, and displays the list of all files currently stored in the cache.
    • NetworkMiner
    • The Sleuth Kit - Collection of command line tools and a C library that allows you to analyze disk images and recover files from them.
    • X-Ways - Advanced work environment for computer forensic examiners.
    • Magnet AXIOM 2.0 - Artifact-centric DFIR tool.
    • Dnscat2 - Hosts communication through DNS.
    • Creddump - Dump Windows credentials.
    • Bulk-extractor - High-performance digital forensics exploitation tool.
    • Volatility - An advanced memory forensics framework.
    • USBRip - Simple CLI forensics tool for tracking USB device artifacts (history of USB events) on GNU/Linux.
    • Scalpel - Open source data carving tool.
    • Registry Dumper - Tool to dump Windows Registry.
    • Forensic Toolkit - It scans a hard drive looking for various information. It can, potentially locate deleted emails and scan a disk for text strings to use them as a password dictionary to crack encryption.
  • Exploiting / Pwn

    • afl - Security-oriented fuzzer.
    • Shellcodes Database - A massive shellcodes database.
    • Pwntools - CTF framework for writing exploits.
    • libformatstr - Simplify format string exploitation.
    • Ropper - Display information about files in different file formats and find gadgets to build rop chains for different architectures.
    • ROPgadget - Framework for ROP exploitation.
    • honggfuzz - Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage.
    • One_gadget - Tool for finding one gadget RCE.
    • Shellcodes Database - A massive shellcodes database.
  • Misc

    • Try It Online - An online tool that has a ton of Esoteric language interpreters.
    • Veles - Binary data analysis and visualization tool.
    • Hashcat - Advanced Password Recovery.
    • John the Ripper - Open Source password security auditing and password recovery.
    • Hydra - Parallelized login cracker which supports numerous protocols to attack.
    • Ophcrack - Free Windows password cracker based on rainbow tables.
    • Intezer Analyze - Malware analysis platform.
    • Any.run - Interactive malware hunting service.
    • Turbo Intruder - Burp Suite extension for sending large numbers of HTTP requests and analyzing the results.
    • Brainfuck - Brainfuck esoteric programming language IDE.
    • COW - It is a Brainfuck variant designed humorously with Bovinae in mind.
    • Malbolge - Malbolge esoteric programming language solver.
    • Ook! - Tool for decoding / encoding in Ook!
    • Piet - Piet programming language compiler.
    • Rockstar - A language intended to look like song lyrics.
    • Triage - State-of-the-art malware analysis sandbox designed for cross-platform support.
    • boofuzz - Network Protocol Fuzzing for Humans.
    • changeme - A default credential scanner.
    • Patator - Multi-purpose brute-forcer, with a modular design and a flexible usage.
    • jwt_tool - A toolkit for testing, tweaking and cracking JSON Web Tokens.
    • Malbolge - Malbolge esoteric programming language solver.
  • Reversing

    • GDB - The GNU Project debugger.
    • Compiler Explorer - Online compiler tool.
    • Hopper - Reverse engineering tool (disassembler) for OSX and Linux.
    • Binary Ninja - Binary Analysis Framework.
    • Frida - Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.
    • Java Decompilers - An online decompiler for Java and Android APKs.
    • WinDBG - Windows debugger distributed by Microsoft.
    • Online Assembler/Disassembler - Online wrappers around the Keystone and Capstone projects.
    • BinUtils - Collection of binary tools.
    • Disassembler.io - Disassemble On Demand.
    • EasyPythonDecompiler - A small .exe GUI application that will "decompile" Python bytecode, often seen in .pyc extension.
    • GEF - A modern experience for GDB with advanced debugging features for exploit developers & reverse engineers.
    • PEDA - Python Exploit Development Assistance for GDB.
    • Pwndbg - Exploit Development and Reverse Engineering with GDB Made Easy.
    • dnSpy - .NET debugger and assembly editor.
    • Objection - Runtime mobile exploration.
    • radare2 - UNIX-like reverse engineering framework and command-line toolset.
    • Jadx - Command line and GUI tools for producing Java source code from Android Dex and Apk files.
    • Androguard - Androguard is a full python tool to play with Android files.
    • Z3 - A theorem prover from Microsoft Research.
    • PEfile - Python module to read and work with PE (Portable Executable) files.
    • Angr - A powerful and user-friendly binary analysis platform.
    • Apk2gold - CLI tool for decompiling Android apps to Java.
    • CWE_checker - Finds vulnerable patterns in binary executables.
    • Rizin - Rizin is a fork of the radare2 reverse engineering framework with a focus on usability, working features and code cleanliness.
    • CTF_import - Run basic functions from stripped binaries cross platform.
    • miasm - Reverse engineering framework in Python.
    • Uncompyle - A Python 2.7 byte-code decompiler (.pyc)
    • JSDetox - A JavaScript malware analysis tool.
    • ApkTool - A tool for reverse engineering 3rd party, closed, binary Android apps.
    • Ghidra - A software reverse engineering (SRE) suite of tools developed by NSA.
    • Online Assembler/Disassembler - Online wrappers around the Keystone and Capstone projects.
    • WinDBG - Windows debugger distributed by Microsoft.
    • Java Decompilers - An online decompiler for Java and Android APKs.
  • Web

    • JSFiddle - Test your JavaScript, CSS, HTML or CoffeeScript online with JSFiddle code editor.
    • BurpSuite - A graphical tool to testing website security.
    • ngrok - Secure introspectable tunnels to localhost.
    • Beautifier.io - Online JavaScript Beautifier.
    • REQBIN - Online REST & SOAP API Testing Tool.
    • Metasploit JavaScript Obfuscator - How to obfuscate JavaScript in Metasploit.
    • Postman - Addon for chrome for debugging network requests.
    • XSSer - Automated XSS testor.
    • SQLMap - Automatic SQL injection and database takeover tool.
    • ffuf - Fast web fuzzer written in Go.
    • dirsearch - Web path scanner.
    • Commix - Automated All-in-One OS Command Injection Exploitation Tool.
    • git-dumper - A tool to dump a git repository from a website.
    • W3af - Web application attack and audit framework.
    • Dirhunt - Find web directories without bruteforce.
    • ysoserial - Tool for generating payloads that exploit unsafe Java object deserialization.
    • PHPGGC - Library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.
    • Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python3.
    • Gopherus - Tool that generates gopher link for exploiting SSRF and gaining RCE in various servers.
    • nomore403 - Tool to bypass 40x errors.
    • Arachni - Web Application Security Scanner Framework.
    • Revelo - Analyze obfuscated Javascript code.
    • debugHunter - Discover hidden debugging parameters and uncover web application secrets.
    • Hookbin - Free service that enables you to collect, parse, and view HTTP requests.
  • Online Platforms

    • HackTheBox - A Massive Hacking Playground.
    • CTF365 - Security Training Platform.
    • CTFlearn - Online platform built to help ethical hackers learn, practice, and compete.
    • Root-me - CTF training platform.
    • VulnHub - VM-based pentesting platform.
    • Hacker101 - CTF Platform by [HackerOne](https://www.hackerone.com/).
    • MicroCorruption - Embedded Security CTF.
    • Cryptopals - Cryptography Challenges.
    • Archive.ooo - Live, playable archive of DEF CON CTF challenges.
    • OverTheWire - Wargame offered by the OverTheWire community.
    • Pwnable.tw - Pwn/Exploiting platform.
    • Reversing.kr - Reverse Engineering platform.
    • W3Challs - Hacking/CTF platform.
    • HBH - Community designed to teach methods and tactics used by malicious hackers to access systems and sensitive information.
    • Komodo - This is a game designed to challenge your application hacking skills.
    • Pwn.college - Education platform to learn about, and practice, core cybersecurity concepts.
    • HackThisSite - Free, safe and legal training ground for hackers.
    • Crackmes.One - Reverse Engineering Challenges.
    • WebHacking - Web challenges platform.
    • Damn Vulnerable Web Application - PHP/MySQL web application that is damn vulnerable.
    • CryptoHack - Cryptography Challenges.
    • 247CTF - Free Capture The Flag Hacking Environment.
    • echoCTF.RED - Online Hacking Laboratories.
    • PWNChallenge - Pwn/Exploiting platform.
    • Pwnable.xyz - Pwn/Exploiting platform.
    • VibloCTF - CTF training platform.
    • Atenea - Spanish CCN-CERT CTF platform.
    • picoCTF - Beginner-friendly CTF platform.
    • Websec.fr - Web challenges platform.
    • WeChall - Challenge sites directory & forum.
    • Defend the Web - An Interactive Cyber Security Platform.
    • 0x0539 - Online CTF challenges.
    • Dreamhack.io - Online wargame.
    • Flagyard - An Online Playground of Hands-on Cybersecurity Challenges.
    • HackBBS - Online wargame.
    • Hackropole - This platform allows you to replay the challenges of the France Cybersecurity Challenge.
    • MNCTF - Online cybersecurity challenges.
    • PWN.TN - Educational and non commercial wargame.
    • YEHD 2015 - YEHD CTF 2015 online challenges.
    • CICD-goat - A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.
    • AWSGoat - A Damn Vulnerable AWS Infrastructure.
    • GCPGoat - A Damn Vulnerable GCP Infrastructure.
    • Juice Shop - Capture-the-Flag (CTF) environment setup tools for OWASP Juice Shop.
    • Reversing.kr - Reverse Engineering platform.
    • Komodo - This is a game designed to challenge your application hacking skills.
    • Wargames BataMladen - Wargame challenge scenarios, each with different levels.
  • Cryptography

    • Enigma Machine - Universal Enigma Machine Simulator.
    • Online Encyclopedia of Integer Sequences - OEIS: The On-Line Encyclopedia of Integer Sequences
    • PKCrack - PkZip encryption cracker.
    • Quipqiup - Automated cryptogram solver.
    • Crackstation - Hash cracker (database).
    • Vigenere Solver - Online tool that breaks Vigenère ciphers without knowing the key.
    • Braille Translator - Translate from braille to text.
    • Cryptii - Modular conversion, encoding and encryption online.
    • dCode.fr - Solvers for Crypto, Maths and Encodings online.
    • Galois - A fast galois field arithmetic library/toolkit.
    • Hash-identifier - Simple hash algorithm identifier.
    • Polybius Square Cipher - Table that allows someone to translate letters into numbers.
    • Rumkin Cipher Tools - Collection of ciphhers/encoders tools.
    • XOR Cracker - Online XOR decryption tool able to guess the key length and the cipher key to decrypt any file.
    • yagu - Automated integer factorization.
    • CyberChef - A web app for encryption, encoding, compression and data analysis.
    • PadBuster - Automated script for performing Padding Oracle attacks.
    • FeatherDuster - An automated, modular cryptanalysis tool.
    • XORTool - A tool to analyze multi-byte xor cipher.
    • RsaCtfTool - RSA multi attacks tool.
    • Base65536 - Unicode's answer to Base64.
    • HashExtender - Tool for performing hash length extension attacks.
    • RSATool - Tool to to calculate RSA and RSA-CRT parameter.
    • Decodify - Detect and decode encoded strings, recursively.
    • padding-oracle-attacker - CLI tool and library to execute padding oracle attacks easily.
    • PEMCrack - Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks.
    • Ciphey - Tool to automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes.
    • Galois - A fast galois field arithmetic library/toolkit.
    • Hash-identifier - Simple hash algorithm identifier.
    • Rumkin Cipher Tools - Collection of ciphhers/encoders tools.
  • Steganography

    • Sonic Visualizer - Audio file visualization.
    • FotoForensics - Provides budding researchers and professional investigators access to cutting-edge tools for digital photo forensics.
    • ImageMagick - Tool for manipulating images.
    • Pngcheck - Verifies the integrity of PNG and dump all of the chunk-level information in human-readable form.
    • Snow - Whitespace Steganography Tool
    • Image Steganography - Client-side Javascript tool to steganographically hide/unhide images inside the lower "bits" of other images.
    • Pngtools - For various analysis related to PNGs.
    • Stegbreak - Launches brute-force dictionary attacks on JPG image.
    • AperiSolve - Platform which performs layer analysis on images.
    • DTMF Tones - Audio frequencies common to a phone button.
    • hipshot - Tool to converts a video file or series of photographs into a single image simulating a long-exposure photograph.
    • Image Error Level Analyzer - Tool to analyze digital images. It's also free and web based. It features error level analysis, clone detection and more.
    • Magic Eye Solver - Get hidden information from images.
    • Stegsolve - Apply various steganography techniques to images.
    • jsteg - Command-line tool to use against JPEG images.
    • BPStegano - Python3 based LSB steganography.
    • DeepSound - Freeware steganography tool and audio converter that hides secret data into audio files.
    • DTMF Detection - Audio frequencies common to a phone button.
    • stegseek - Lightning fast steghide cracker that can be used to extract hidden data from files.
    • Steganography Online - Online steganography encoder and decoder.
    • StegoVeritas - Yet another stego tool.
    • stegextract - Detect hidden files and text in images.
    • StegCracker - Brute-force utility to uncover hidden data inside files.
    • Pngcheck - Verifies the integrity of PNG and dump all of the chunk-level information in human-readable form.
    • SmartDeblur - Restoration of defocused and blurred photos/images.
    • Exiv2 - Image metadata manipulation tool.
    • hipshot - Tool to converts a video file or series of photographs into a single image simulating a long-exposure photograph.
    • Magic Eye Solver - Get hidden information from images.
    • sigBits - Steganography significant bits image decoder.
    • Snow - Whitespace Steganography Tool
    • Stegosaurus - A steganography tool for embedding payloads within Python bytecode.
    • Stegpy - Simple steganography program based on the LSB method.
    • stegsnow - Whitespace steganography program.
  • Writeups Repositories

  • Platforms

    • FBCTF - Facebook CTF platform to host Jeopardy and "King of the Hill" CTF competitions.
    • kCTF - Kubernetes-based infrastructure for CTF competitions.
    • CTFd - Platform to host jeopardy style CTFs.
    • HackTheArch - Scoring server for CTF competitions.
    • LibreCTF - CTF platform from EasyCTF.
    • Mellivora - CTF engine written in PHP.
    • NightShade - Simple CTF framework.
    • picoCTF - Infrastructure used to run picoCTF.
    • rCTF - CTF platform maintained by the [redpwn](https://github.com/redpwn/rctf) CTF team.
    • RootTheBox - CTF scoring engine for wargames.
    • ImaginaryCTF - Platform to host CTFs.
  • Collaborative Tools

    • CTFNote - Collaborative tool aiming to help CTF teams to organise their work.