CTF-Party is a library to enhance and speed up script/exploit writing for CTF players (or security researchers, bug bounty hunters, pentesters but mostly focused on CTF) by patching the String class to add a short syntax of usual code patterns.
The philosophy is also to keep the library to be pure ruby (no dependencies) and not to re-implement what another library is already doing well (eg. xorcist for xor).
For example instead of writing:
require ‘base64’
myvar = ‘string’
myvar = Base64.strict_encode64(myvar)
Just write (shorter and easier to remember):
require ‘ctf_party’
myvar = ‘string’
myvar.to_b64!
Features
to_b64
, to_b64!
, from_b64
, from_b64!
, b64?
md5
, md5!
, sha1
, sha1!
, etc.flag
, flag!
, flag?
(apply/check a flag format)rot
, rot!
, rot13
, rot13!
hex2dec
, dec2hex
, to_hex
, from_hex
, hex2bin
, bin2hex
and bang versionsCredit: Alexandre ZANNI
Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…
Docker is one of the most widely used containerization platforms. But there may come a…
Introduction Google Dorking is a technique where advanced search operators are used to uncover information…
Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…
What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…