Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/randomsctf/ctf-scripts
A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments
https://github.com/randomsctf/ctf-scripts
Last synced: 24 days ago
JSON representation
A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments
- Host: GitHub
- URL: https://github.com/randomsctf/ctf-scripts
- Owner: RandomsCTF
- License: gpl-3.0
- Created: 2015-09-11T00:00:28.000Z (over 9 years ago)
- Default Branch: master
- Last Pushed: 2015-09-22T12:58:12.000Z (about 9 years ago)
- Last Synced: 2024-08-04T23:11:03.487Z (4 months ago)
- Language: Python
- Size: 139 KB
- Stars: 10
- Watchers: 6
- Forks: 3
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-security-collection - **10**星
README
# ctf-scripts
A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments.All scripts are GPLv3 licensed unless stated otherwise. Use for **good**, not for evil...
Higly recommended (but not necessary) is the `virtualenv` package, as it virtualizes your Python environments.
## forensics/extract_file.py
Extracts files from a pcap file containing a (fragmented) HTTP download or stream.
Example usage:
```
justsniffer -f myfile.pcap -l "%response" -e 'extract_file.py output.file'
```This will extract the (fragmented) HTTP download from myfile.pcap and writes the output to output.file
justniffer will take care of the lower protocol layers.Currently `extract_file.py` only handles streamed input.
## web/timing-bruteforcer.py
Bruteforces passwords by using a timing attack on webforms.
Based on the notion that successful password (characters) are expected to take longer(!) to process than unsuccessful passwords.Example usage:
```
timing_bruteforcer.py http://my.site.com --username admin
```Currently only hexadecimal 'passwords' are supported.
## Setup
```
git clone https://github.com/RandomsCTF/ctf-scripts.git
which virtualenv && virtualenv ctf-scripts && pushd ctf-scripts
[ -f bin/activate ] && source bin/activate
[ -f Scripts/Activate ] && source Scripts/Activate
```