Différences

Ci-dessous, les différences entre deux révisions de la page.

Lien vers cette vue comparative

Les deux révisions précédentes Révision précédente
Prochaine révision
Révision précédente
ctf:public:tools [2016/10/15 21:29]
arthaum
ctf:public:tools [2020/11/07 19:26] (Version actuelle)
benaimg hoppscotch
Ligne 13: Ligne 13:
   * [[https://github.com/longld/peda|gdb-peda]], a python exploit development assistance for GDB. It improves a lot gdb, especially by showing you the values pointed by addresses in registers or on the stack.   * [[https://github.com/longld/peda|gdb-peda]], a python exploit development assistance for GDB. It improves a lot gdb, especially by showing you the values pointed by addresses in registers or on the stack.
   * [[https://en.wikipedia.org/wiki/Objdump|objdump]] and [[https://sourceware.org/binutils/docs/binutils/readelf.html|readelf]], programs to display information about executables.    * [[https://en.wikipedia.org/wiki/Objdump|objdump]] and [[https://sourceware.org/binutils/docs/binutils/readelf.html|readelf]], programs to display information about executables. 
 +  * [[https://en.wikipedia.org/wiki/Strace|strace]], a program that prints all system calls.
 +  * [[https://linux.die.net/man/1/ltrace|ltrace]] is similar to strace, but it prints all dynamic library calls.
   * [[https://www.hex-rays.com/products/ida/|IDA Pro]], a disassembler and debugger. The awesome decompiler can give you a pseudocode of the binary.   * [[https://www.hex-rays.com/products/ida/|IDA Pro]], a disassembler and debugger. The awesome decompiler can give you a pseudocode of the binary.
   * [[http://angr.io/|angr]], a python framework for analyzing binaries. It focuses on both static and dynamic symbolic analysis, making it applicable to a variety of tasks.   * [[http://angr.io/|angr]], a python framework for analyzing binaries. It focuses on both static and dynamic symbolic analysis, making it applicable to a variety of tasks.
Ligne 21: Ligne 23:
   * [[https://www.metasploit.com/|Metasploit]], a penetration testing software. Mostly used in the team to automatically generate shellcodes.   * [[https://www.metasploit.com/|Metasploit]], a penetration testing software. Mostly used in the team to automatically generate shellcodes.
   * [[https://github.com/arthaud/formatstring|python-formatstring]], a library to exploit format string vulnerabilities in python   * [[https://github.com/arthaud/formatstring|python-formatstring]], a library to exploit format string vulnerabilities in python
 +  * [[http://www.nasm.us/|nasm]], an assembler for x86 and amd64.
 +  * [[https://github.com/sashs/Ropper|ropper]], a tool to find gadgets to write ROP chains
 +
 +===== Cryptography =====
 +
 +  * [[https://docs.python.org/3.5/library/hashlib.html|python hashlib]], a library that implements common hash functions in python.
 +  * [[https://www.dlitz.net/software/pycrypto/|pycrypto]], a library that implements symmetric/asymmetric key encryption in python. This tool is not maintained anymore, and has vulnerabilities so don't use it in production.
 +  * [[http://www.dcode.fr/|dcode.fr]], a website that has great tools to decode ceasar cipher, vigenère cipher and others.
 +  * [[https://github.com/iagox86/hash_extender|hash_extender]], a tool to perform hash length extension attacks. It supports common hash functions.
 +  * [[https://www.unix-ag.uni-kl.de/~conrad/krypto/pkcrack.html|pkcrack]], a tool to perform known plaintext attacks on zip files. Don't forget to send a postcard to the author if you like it.
 +
 +===== Forensic =====
 +
 +  * [[https://www.wireshark.org/|wireshark]], the well known network protocol analyzer.
 +  * [[http://www.volatilityfoundation.org/|volatility]], a memory forensics framework for incident response and malware analysis.
 +  * [[http://foremost.sourceforge.net/|foremost]], a tool to extract embedded media files.
 +
 +===== Web =====
 +
 +==== Client Side ====
 +
 +  * [[http://jsbeautifier.org/|jsbeautifier]], a tool to beautify/deobfuscate javascript.
 +  * [[https://www.free-decompiler.com/flash/|jpexs flash decompiler]], a flash decompiler.
 +  * [[http://utf-8.jp/public/jjencode.html|jjencode]], to encode/decode javascript using symbols only.
 +
 +==== Server side ====
 +
 +  * [[http://docs.python-requests.org/en/master/|python requests]], a library to craft http requests in python.
 +  * [[https://www.owasp.org/index.php/Category:OWASP_DirBuster_Project|DirBuster]], a multi threaded java application designed to brute force directories and files names.
 +  * [[https://addons.mozilla.org/en-US/firefox/addon/tamper-data/|tamper data]], a firefox plugin to modify HTTP requests directly in your browser.
 +  * [[https://portswigger.net/burp/|Burp Suite]], an integrated platform for performing security testing of web applications.
 +  * [[http://sqlmap.org/|sqlmap]], the best tool to perform automatic SQL injections.
 +  * [[http://wapiti.sourceforge.net/|wapiti]], a vulnerability scanner in python.
 +  * [[https://hoppscotch.io/ |hoppscotch.io]], a web app that does the same thing as curl and postman
 +===== Miscellaneous =====
 +
 +  * [[http://www.openwall.com/john/|john the ripper]], a password cracker.
 +  * [[https://hashcat.net/hashcat/|hashcat]], another password cracker.