CTF-Party is a library to enhance and speed up script/exploit writing for CTF players (or security researchers, bug bounty hunters, pentesters but mostly focused on CTF) by patching the String class to add a short syntax of usual code patterns.
The philosophy is also to keep the library to be pure ruby (no dependencies) and not to re-implement what another library is already doing well (eg. xorcist for xor).
For example instead of writing:
require ‘base64’
myvar = ‘string’
myvar = Base64.strict_encode64(myvar)
Just write (shorter and easier to remember):
require ‘ctf_party’
myvar = ‘string’
myvar.to_b64!
Features
to_b64
, to_b64!
, from_b64
, from_b64!
, b64?
md5
, md5!
, sha1
, sha1!
, etc.flag
, flag!
, flag?
(apply/check a flag format)rot
, rot!
, rot13
, rot13!
hex2dec
, dec2hex
, to_hex
, from_hex
, hex2bin
, bin2hex
and bang versionsCredit: Alexandre ZANNI
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…