Cyber security

Awesome CTF – The Comprehensive Toolkit For Capture The Flag Challenges

A curated list of Capture The Flag (CTF) frameworks, libraries, resources, softwares and tutorials. This list aims to help starters as well as seasoned CTF players to find everything related to CTFs at one place.

Contributing

Please take a quick look at the contribution guidelines first.

If you know a tool that isn’t present here, feel free to open a pull request.

Why?

It takes time to build up collection of tools used in CTF and remember them all. This repo helps to keep all these scattered tools at one place.

Contents

  • Awesome CTF
    • Create
      • Forensics
      • Platforms
      • Steganography
      • Web
    • Solve
      • Attacks
      • Bruteforcers
      • Cryptography
      • Exploits
      • Forensics
      • Networking
      • Reversing
      • Services
      • Steganography
      • Web
  • Resources
    • Operating Systems
    • Starter Packs
    • Tutorials
    • Wargames
    • Websites
    • Wikis
    • Writeups Collections

Create

Tools used for creating CTF challenges

Forensics

Tools used for creating Forensics challenges

Platforms

Projects that can be used to host a CTF

  • CTFd – Platform to host jeopardy style CTFs from ISISLab, NYU Tandon.
  • echoCTF.RED – Develop, deploy and maintain your own CTF infrastructure.
  • FBCTF – Platform to host Capture the Flag competitions from Facebook.
  • Haaukins– A Highly Accessible and Automated Virtualization Platform for Security Education.
  • HackTheArch – CTF scoring platform.
  • Mellivora – A CTF engine written in PHP.
  • MotherFucking-CTF – Badass lightweight plaform to host CTFs. No JS involved.
  • NightShade – A simple security CTF framework.
  • OpenCTF – CTF in a box. Minimal setup required.
  • PicoCTF – The platform used to run picoCTF. A great framework to host any CTF.
  • PyChallFactory – Small framework to create/manage/package jeopardy CTF challenges.
  • RootTheBox – A Game of Hackers (CTF Scoreboard & Game Manager).
  • Scorebot – Platform for CTFs by Legitbs (Defcon).
  • SecGen – Security Scenario Generator. Creates randomly vulnerable virtual machines.

Steganography

Tools used to create stego challenges

Check solve section for steganography.

Web

Tools used for creating Web challenges

JavaScript Obfustcators

Solve

Tools used for solving CTF challenges

Attacks

Tools used for performing various kinds of attacks

  • Bettercap – Framework to perform MITM (Man in the Middle) attacks.
  • Yersinia – Attack various protocols on layer 2.

Crypto

Tools used for solving Crypto challenges

  • CyberChef – Web app for analysing and decoding data.
  • FeatherDuster – An automated, modular cryptanalysis tool.
  • Hash Extender – A utility tool for performing hash length extension attacks.
  • padding-oracle-attacker – A CLI tool to execute padding oracle attacks.
  • PkCrack – A tool for Breaking PkZip-encryption.
  • QuipQuip – An online tool for breaking substitution ciphers or vigenere ciphers (without key).
  • RSACTFTool – A tool for recovering RSA private key with various attack.
  • RSATool – Generate private key with knowledge of p and q.
  • XORTool – A tool to analyze multi-byte xor cipher.

Bruteforcers

Tools used for various kind of bruteforcing (passwords etc.)

  • Hashcat – Password Cracker
  • Hydra – A parallelized login cracker which supports numerous protocols to attack
  • John The Jumbo – Community enhanced version of John the Ripper.
  • John The Ripper – Password Cracker.
  • Nozzlr – Nozzlr is a bruteforce framework, trully modular and script-friendly.
  • Ophcrack – Windows password cracker based on rainbow tables.
  • Patator – Patator is a multi-purpose brute-forcer, with a modular design.
  • Turbo Intruder – Burp Suite extension for sending large numbers of HTTP requests
Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How AI Puts Data Security at Risk

Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…

1 week ago

The Evolution of Cloud Technology: Where We Started and Where We’re Headed

Image credit:pexels.com If you think back to the early days of personal computing, you probably…

2 weeks ago

The Evolution of Online Finance Tools In a Tech-Driven World

In an era defined by technological innovation, the way people handle and understand money has…

2 weeks ago

A Complete Guide to Lenso.ai and Its Reverse Image Search Capabilities

The online world becomes more visually driven with every passing year. Images spread across websites,…

2 weeks ago

How Web Application Firewalls (WAFs) Work

General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…

2 months ago

How to Send POST Requests Using curl in Linux

How to Send POST Requests Using curl in Linux If you work with APIs, servers,…

2 months ago