Différences

Ci-dessous, les différences entre deux révisions de la page.

Lien vers cette vue comparative

Les deux révisions précédentes Révision précédente
Prochaine révision
Révision précédente
ctf:public:tools [2016/10/15 21:57]
arthaum
ctf:public:tools [2020/11/07 19:26] (Version actuelle)
benaimg hoppscotch
Ligne 23: Ligne 23:
   * [[https://www.metasploit.com/|Metasploit]], a penetration testing software. Mostly used in the team to automatically generate shellcodes.   * [[https://www.metasploit.com/|Metasploit]], a penetration testing software. Mostly used in the team to automatically generate shellcodes.
   * [[https://github.com/arthaud/formatstring|python-formatstring]], a library to exploit format string vulnerabilities in python   * [[https://github.com/arthaud/formatstring|python-formatstring]], a library to exploit format string vulnerabilities in python
 +  * [[http://www.nasm.us/|nasm]], an assembler for x86 and amd64.
 +  * [[https://github.com/sashs/Ropper|ropper]], a tool to find gadgets to write ROP chains
  
-==== Cryptography ====+===== Cryptography =====
  
   * [[https://docs.python.org/3.5/library/hashlib.html|python hashlib]], a library that implements common hash functions in python.   * [[https://docs.python.org/3.5/library/hashlib.html|python hashlib]], a library that implements common hash functions in python.
Ligne 32: Ligne 34:
   * [[https://www.unix-ag.uni-kl.de/~conrad/krypto/pkcrack.html|pkcrack]], a tool to perform known plaintext attacks on zip files. Don't forget to send a postcard to the author if you like it.   * [[https://www.unix-ag.uni-kl.de/~conrad/krypto/pkcrack.html|pkcrack]], a tool to perform known plaintext attacks on zip files. Don't forget to send a postcard to the author if you like it.
  
 +===== Forensic =====
 +
 +  * [[https://www.wireshark.org/|wireshark]], the well known network protocol analyzer.
 +  * [[http://www.volatilityfoundation.org/|volatility]], a memory forensics framework for incident response and malware analysis.
 +  * [[http://foremost.sourceforge.net/|foremost]], a tool to extract embedded media files.
 +
 +===== Web =====
 +
 +==== Client Side ====
 +
 +  * [[http://jsbeautifier.org/|jsbeautifier]], a tool to beautify/deobfuscate javascript.
 +  * [[https://www.free-decompiler.com/flash/|jpexs flash decompiler]], a flash decompiler.
 +  * [[http://utf-8.jp/public/jjencode.html|jjencode]], to encode/decode javascript using symbols only.
 +
 +==== Server side ====
 +
 +  * [[http://docs.python-requests.org/en/master/|python requests]], a library to craft http requests in python.
 +  * [[https://www.owasp.org/index.php/Category:OWASP_DirBuster_Project|DirBuster]], a multi threaded java application designed to brute force directories and files names.
 +  * [[https://addons.mozilla.org/en-US/firefox/addon/tamper-data/|tamper data]], a firefox plugin to modify HTTP requests directly in your browser.
 +  * [[https://portswigger.net/burp/|Burp Suite]], an integrated platform for performing security testing of web applications.
 +  * [[http://sqlmap.org/|sqlmap]], the best tool to perform automatic SQL injections.
 +  * [[http://wapiti.sourceforge.net/|wapiti]], a vulnerability scanner in python.
 +  * [[https://hoppscotch.io/ |hoppscotch.io]], a web app that does the same thing as curl and postman
 +===== Miscellaneous =====
 +
 +  * [[http://www.openwall.com/john/|john the ripper]], a password cracker.
 +  * [[https://hashcat.net/hashcat/|hashcat]], another password cracker.