Tools for the CTFs
- IDA (Demo, if not Pro)
- gdb
- PEDA - makes gdb far more usable
- qira - if you can get it to work & understand it
- checksec - peda can give the same info though
- pwntools - makes pwning easier
- radare2 - reverse engineering framework
- angr - a binary analysis framework with a great symbolic execution engine
- fupy - fast and dirty python decompiler
- JD-GUI - java decompiler
- Java Decompilers - Online decompiler for Java and Android APKs
- syms2elf - A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table
- Objdump
- Rumkin ciphers - multiple (ancient) crypto stuff
- quipqiup - solving cryptograms
- xortool - solving multi-byte xor cipher
- rsatool - to calculate rsa params
- featherduster - An automated, modular cryptanalysis tool
- attackrsa - An all-in-one tool including many common attacks against RSA problems in CTF
- RsaCTFtool - An automated tool to crack public keys of rsa using various standard techniques
- Untwister - A seed recovery tool for various PRNGs
- PkCrack - A tool for Breaking PkZip-encryption
- Cyberchef - encoding & decoding
- Online substitution cypher solver
- Foremost - recover hidden files
- Binwalk - find offsets of files which are concatenated contiguously
- Autopsy - find deleted files from harddisk dumps
- Wireshark - analyze network captures
- Stegsolve
- Cloudshark - Analyze network captures online
- John The Ripper - password cracking tool
- Stegosaurus - tool that allows embedding arbitrary payloads in Python bytecode (pyc or pyo) files
- Audacity - Analyze sound files (mp3, m4a, whatever)
apt-get install audacity
- bkhive and samdump2 - Dump SYSTEM and SAM files
apt-get install samdump2 bkhive
- CFF Explorer - PE Editor
- Exif Tool - Read, write and edit file metadata
- extundelete - Used for recovering lost data from mountable images
- Foremost - Extract particular kind of files using headers
apt-get install foremost
- fsck.ext4 - Used to fix corrupt filesystems
- NetworkMiner - Network Forensic Analysis Tool
run:
mono NetworkMiner.exe
- Google dork
- steg online tool
- Photorec from testdisk - recovering deleted file from disk
best tool
- imago-forensics - Imago is a python tool that extract digital evidences from images.
-
GitTools - downloads exposed .git repo of vulnearable websites
-
SQLMap - automated sql injection
-
Hackbar - indispensible addon for web exploitation in firefox
-
CookieManager - addon for firefox
-
Postman - add on for chrome.
-
requests - python library used for sending HTTP requests
-
Wfuzz - to detect directories and pages on the server using common wordlists.
-
knockpy - Knock Subdomain Scan
-
Sublist3r - Fast subdomains enumeration tool for penetration testers.
-
What CMS - discover cms being used
-
Striker - Striker is an offensive information and vulnerability scanner. Mainly DNS
-
XSStrike - Most advanced XSS scanner.
-
joomscan - OWASP Joomla Vulnerability Scanner Project Owasp Doc.
-
OWASP Zap - alternative to burp
-
Wfuzz - fuzzer and discovery tool - allows the discovery of web content by using wordlists
-
Dirb/dirbuster, dirbuster - brute force directories and files names on web/application servers.
-
Knockpy - subdomain enum using wordlists.
-
Sublist3r - Subdomain enumeration with the use of search engines or OSINT
-
Seclists - great lists for assessments, usernames, passwords, URLs, fuzzing strings,common directories/files/sub domains
-
Scrapy - Web crawling framework that allows you to create your own web crawlers
-
For exploits - Use exploit-db
-
can-i-take-over-xyz - a list of services and how to claim (sub)domains with dangling DNS records.
Tools used for various kind of bruteforcing (passwords etc.)
- Ophcrack - Windows password cracker based on rainbow tables.
Tools used for solving Exploits challenges
-
Bug Bounty Blogs - A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.