https://github.com/divinemonk/ctfdb
{ CTF Database }= (A collection of of websites and resources you will ever need for offline/online CTF competitions)
https://github.com/divinemonk/ctfdb
binary-exploitation capture-the-flag cryptography ctf ctfs cyber cyber-security cybersecurity database guide hacker hacking information information-security pathway reverse-engineering roadmap steganography training-materials web-security
Last synced: 3 months ago
JSON representation
{ CTF Database }= (A collection of of websites and resources you will ever need for offline/online CTF competitions)
- Host: GitHub
- URL: https://github.com/divinemonk/ctfdb
- Owner: Divinemonk
- License: mit
- Created: 2023-06-07T18:24:15.000Z (about 2 years ago)
- Default Branch: m41n
- Last Pushed: 2023-06-28T13:58:00.000Z (almost 2 years ago)
- Last Synced: 2025-02-05T23:29:23.600Z (5 months ago)
- Topics: binary-exploitation, capture-the-flag, cryptography, ctf, ctfs, cyber, cyber-security, cybersecurity, database, guide, hacker, hacking, information, information-security, pathway, reverse-engineering, roadmap, steganography, training-materials, web-security
- Homepage:
- Size: 61.5 KB
- Stars: 8
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
- Roadmap: ROADMAP.md
Awesome Lists containing this project
README
# CTF Database
- [CTF Training Roadmap & 30 day plan](ROADMAP.md)
- [Top recommendations](TOP.md)
## List of practice sites
- bWAPP
-
Cryptopals - Cryptographic programming challenges - CTF Challenge
- CTF365
- CTFlearn
- CTFTime
- Enigma Group
- Game of Hacks
-
Google Gruyere - Vulnerable web app -
Google XSS Game - Cross-site scripting for beginners - Hack This Site
- Hack.me
- Hacking-Lab
- HackThis!!
- Hellbound Hackers
- IO
-
Juice shop - Vulnerable web app -
Microcorruption - ARM disassembling - Over The Wire wargames
- OWASP WebGoat 1.2
- picoCTF
- Portswigger’s Web Security Academy
- pwn0
- pwnable.kr
- pwnable.tw
- Reversing.kr
- RingZer0 Team Online CTF
- Root Me
- SmashTheStack
- Try2Hack
- Typhoon vulnerable VM
- W3Challs
- XSS Challenge Wiki
Live Online Games
Recommended
-
http://pwnable.tw/ (a newer set of high quality pwnable challenges) -
http://pwnable.kr/ (one of the more popular recent wargamming sets of challenges) -
https://picoctf.com/ (Designed for high school students while the event is usually new every year, it's left online and has a great difficulty progression) -
https://microcorruption.com/login (one of the best interfaces, a good difficulty curve and introduction to low-level reverse engineering, specifically on an MSP430) -
http://ctflearn.com/ (a new CTF based learning platform with user-contributed challenges) - https://cherryblog.in/
- http://reversing.kr/
- http://hax.tor.hu/
- https://w3challs.com/
- https://pwn0.com/
- https://io.netgarage.org/
- http://ringzer0team.com/
- http://www.hellboundhackers.org/
- http://www.overthewire.org/wargames/
- http://counterhack.net/Counter_Hack/Challenges.html
- http://www.hackthissite.org/
- http://vulnhub.com/
- http://ctf.komodosec.com
Others
- https://backdoor.sdslabs.co/
- http://smashthestack.org/wargames.html
- http://www.mod-x.co.uk/main.php
- http://scanme.nmap.org/
- http://www.hackertest.net/
- http://net-force.nl/
Meta
-
http://www.wechall.net/sites.php (excellent list of challenge sites) -
http://ctf.forgottensec.com/wiki/ (good CTF wiki, though focused on CCDC) -
http://repo.shell-storm.org/CTF/ (great archive of CTFs)
Webapp Specific
- http://demo.testfire.net/
- http://wocares.com/xsstester.php
- http://crackme.cenzic.com/
- http://test.acunetix.com/
- http://zero.webappsecurity.com/
Forensics Specific
- http://computer-forensics.sans.org/community/challenges
- http://computer-forensics.sans.org/community/challenges
- http://forensicscontest.com/
Recruiting
Commercial/Freemium/Paid Training
-
https://www.root-me.org/ (well done set of challenges free for public use with optional paid commercial versions) -
https://avatao.com (paid commercial training platform from a CTF team, though with a strong focus on secure app development) - http://heorot.net/
Downloadable Offline Games
- http://www.badstore.net/
- http://www.owasp.org/index.php/Category:OWASP_WebGoat_Project
- http://www.owasp.org/index.php/Owasp_SiteGenerator
- Damn Vulnerable Web App
- Stanford SecureBench
- Stanford SecureBench Micro
- http://www.irongeek.com/i.php?page=security/mutillidae-deliberately-vulnerable-php-owasp-top-10
Virtual Machines
- https://pentesterlab.com/exercises/
- http://sourceforge.net/projects/metasploitable/files/Metasploitable2/
-
Damn Vulnerable Linux (not currently live? local mirror)
## Capture The Signal (CTS)
### CTS client
* [CTS tools](https://github.com/capturethesignal/cts-tools), original, Python2+GNU 3.7
* [CTS tools VM](https://cts.ninja/downloads/)
* [CTS tools](https://github.com/BlackVS/cts-tools), fork, Python3, Tested with Python 3.9
* [CTS Utils](https://github.com/BlackVS/cts-utils), soome additional tools.
### How to run tools
* [Installing tools](cts-tools.md)
* [Receiving signal](cts-get-signal.md)
* [How to run local server](cts-utils.md)
* [How signals are sent from server?](cts-signals.md)
### CTS server
You may run you own server
* [CTS backend](https://github.com/capturethesignal/cts-backend)
## Software
### CTS used
* [GNU Radio](https://github.com/gnuradio/gnuradio) is a free & open-source software development toolkit that provides signal processing blocks to implement software radios.
* [SigDigger](https://github.com/BatchDrake/SigDigger) is a free digital signal analyzer for GNU/Linux and macOS, designed to extract information of unknown radio signals.
* [Gqrx](https://github.com/gqrx-sdr/gqrx) is an open source software defined radio (SDR) receiver implemented using GNU Radio and the Qt GUI toolkit.
* [URH](https://github.com/jopohl/urh) is a complete suite for wireless protocol investigation with native support for many common Software Defined Radios.
* [inspectrum](https://github.com/miek/inspectrum) is a tool for analysing captured signals, primarily from software-defined radio receivers.
* [Audacity](https://www.audacityteam.org/) is an easy-to-use, multi-track audio editor and recorder for Windows, macOS, GNU/Linux and other operating systems.
* [Swiss Army knife of sound processing programs](http://sox.sourceforge.net/) is a cross-platform (Windows, Linux, MacOS X, etc.) command line utility that can convert various formats of computer audio files in to other formats. It can also apply various effects to these sound files, and, as an added bonus, SoX can play and record audio files on most platforms.
### Other
* [rtl_433](https://github.com/merbanan/rtl_433) is a generic data receiver, mainly for the 433.92 MHz, 868 MHz (SRD), 315 MHz, 345 MHz, and 915 MHz ISM bands.
* [Software By W1HKJ & Associates](http://www.w1hkj.com/)
* [Fast Light Digital Modem Application](https://sourceforge.net/p/fldigi/wiki/Home/)
* [SSTV and HamDRM for Linux](http://users.telenet.be/on4qz/index.html)
* [Ham Radio Software on Centos Linux](http://www.trinityos.com/HAM/CentosDigitalModes/hampacketizing-centos.html#28.qsstv)
* [Dire Wolf](https://github.com/wb2osz/direwolf), Decoded Information from Radio Emissions for Windows Or Linux Fans
* [minimodem ](http://www.whence.com/minimodem/), general-purpose software audio FSK modem for GNU/Linux systems
* [Weak Signal Communication Software](https://physics.princeton.edu//pulsar/K1JT/)
* [wctf-sdr-tools](https://github.com/rfhs/rfctf-sdr-tools), GNU Radio ZMQ Receivers
* [Suscan](https://github.com/BatchDrake/suscan), is a realtime DSP processing library. It provides a set of useful abstractions to perform dynamic digital signal analysis and demodulation
## Signals
* [Signal Identification Guide](https://www.sigidwiki.com/wiki/Signal_Identification_Guide)
* [Sights & Sounds](http://www.w1hkj.com/modes/index.htm)
* [Radio Signals Recognition Manual](https://aresvalley.com/artemis/)
### Modulations
* [FSK Demodulation in GNU Radio](https://wirelesspi.com/fsk-demodulation-in-gnu-radio/)
* [Manually Decoding ASK PWM Signals from rtl_433 Signal I/Q Sample Files using Universal Radio Hacker](https://github.com/klohner/klohner.github.io/tree/master/SDR/Decoding/Example_2019-01-18)
## Links
### GSM
* [gr-gsm](https://github.com/ptrkrysik/gr-gsm), is a tool for analysing captured signals, primarily from software-defined radio receivers.
* [Osmocom projects](https://osmocom.org/projects)
* [3GPP Message Decoder](https://www.3glteinfo.com/3gpp-message-decoder/), tool to decode GSM, UMTS, LTE, IP messages
### DTMF
* [Detect DTMF Tones](http://www.dialabc.com/sound/detect/)
* [DTMF decoder](https://github.com/ribt/dtmf-decoder)
* [DTMF Code](https://www.dcode.fr/dtmf-code)
## Other RF/SDR Awesome lists
* [RFSec-ToolKit V 2.0](https://github.com/cn0xroot/RFSec-ToolKit), is a collection of Radio Frequency Communication Protocol Hacktools which are from the github platform, and Hacking Tutorial from youtube、blog post, including SDR、2G GSM、3G 、4G LTE 、5G、NFC&RFID、ZigBee and so on.
### Other
* [GNU Radio-Companion Cook Book](https://cdn.hackaday.io/files/1648847054397056/GRC%20Cook%20Book.pdf), Tips, Tricks and Design Patterns
* [CyberChef - The Cyber Swiss Army Knife](https://gchq.github.io/CyberChef/)
* [dCode](https://www.dcode.fr), is the universal site for decoding messages, cheating on letter games, solving puzzles, geocaches and treasure hunts, etc.
Inactive or Gone
- http://rootcontest.com/
- http://intruded.net/
- https://how2hack.net
- WebMaven (Buggy Bank)
- http://www.foundstone.com/us/resources/proddesc/hacmetravel.htm
- http://www.foundstone.com/us/resources/proddesc/hacmebooks.htm
- http://www.foundstone.com/us/resources/proddesc/hacmecasino.htm
- http://www.foundstone.com/us/resources/proddesc/hacmeshipping.htm
- http://hackme.ntobjectives.com/
- http://testphp.acunetix.com/
- http://testasp.acunetix.com/Default.asp
- http://prequals.nuitduhack.com
-
http://www.gat3way.eu/index.php (Russian) -
http://exploit-exercises.com/ (challenges mirrored on vulnhub) - http://damo.clanteam.com/
- http://p6drad-teel.net/~windo/wargame/
- http://roothack.org/
- http://ha.ckers.org/challenge/
- http://ha.ckers.org/challenge2/
- http://www.dc3.mil/challenge/