L00king for a tool / link / command? Find it here ... by {THUGS}

Tool name Tags Description

Ciphers & Codes

A page dedicated to simple text manipulation tools, which all can be replicated with just paper and pencil

LINK

MP3Stego

Hide information in MP3 files during the compression process

LINK

Steghide

A steganography program that is able to hide data in various kinds of image- and audio-files (JPEG, BMP, WAV and AU files)

LINK

Foremost

Finds stuff in binary files and recover it

LINK

Exiftool

reading, writing and editing meta information in a wide variety of files

LINK

Xortool

XOR analysis, guess the key length or key

LINK

Pwntools

CTF framework and exploit development library. Written in Python

LINK

V0lt

(outdated) Security CTF, Python style. Making CFT scripting easy in python

LINK

Androguard

Full python tool to play with Android files DEX, ODEX and APK

LINK

Ctf_import

Small library that allows you to run basic functions from stripped binaries cross platform

LINK

Outguess

Universal steganographic tool

LINK

Reverse Shell

Payloads All The Things- Reverse Shell Cheatsheet

LINK

Reverse Shell #2

d4t4s3c - Reverse Shell Cheat Sheet

LINK

Quipqiup

An online tool for breaking substitution ciphers or vigenere ciphers (without key)

LINK

Snow

Whitespace Steganography Tool

LINK

AperiSolve

Online platform which performs layer analysis on images also uses zsteg, steghide, outguess, exiftool, binwalk, foremost and strings for deeper steganography analysis

LINK

Searchsploit

Command line search tool for Exploit-DB that also allows you to take a copy of Exploit Database with you, everywhere you go

LINK

Dirbuster

DirBuster is a multi threaded java application designed to brute force directories and files names on web/application servers

LINK

Gobuster

tool used to brute-force URIs, DNS, Virtual Host, Open Amazon S3 buckets

LINK

Gobuster dir+session

gobuster dir -u http://<ip_host> -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x php -c PHPSESSID=<session_value>

Vigenere

online tool breaks Vigenere ciphers without knowing the key

LINK

Dirtycow

Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux Kernel (Old exploit) 2.6.22 and below

LINK

Fcrackzip

A braindead program for cracking encrypted ZIP archives

LINK

LinEnum

Best scripted local Linux enumeration & privilege escalation checks

LINK

Hackingtool

ALL IN ONE Hacking Tool For Hackers (It's okay and works but i would use it just a yey an option for a tool)

LINK

Stego-toolkit

Collection of steganography tools - helps with CTF challenges

LINK

CTFCrackTools

China's first CTFTools framework (Use at your own risk hahah)

LINK

Ciphey

Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes

LINK

Name-That-Hash

Don't know what type of hash it is? Name That Hash will name that hash type! Identify MD5, SHA256 and 300+ other hashes

LINK

Text Converter

Text Converter converts text to other encodings or other formats. Supported formats include Base64, Quoted-Printable, URL encoding, HTML encoding, various types of text conversion and formatting, as well as hash calculations

LINK

ASCII ANSI Table

ASCII (American Standard Code for Information Interchange) is a 7-bit character set that contains characters from 0 to 127

LINK

Unicode Table

Unicode, formally the Unicode Standard, is an information technology standard for the consistent encoding, representation, and handling of text expressed in most of the world's writing systems

LINK

Steganabara

Steganabara is a tool for stegano analysis (steganalysis). Steganabara has now matured and is very effective on visual steganos

LINK

Cryptii

Web app offering modular conversion, encoding and encryption online. Translations are done in the browser without any server interaction. Very handy CTF tool!

LINK

Kali Linux

Open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering

LINK

CyberChef

The best online tool for analysing and decoding data

LINK

Pwninit

pwninit - automate starting binary exploit challenges.

LINK

Knock

Simple python port knocking client

LINK

Ffuf

Fast web fuzzer written in Go

LINK

Etherblob-explorer

Search and extract blob files on the Ethereum Blockchain network

LINK

Go-ethereum

Official Go implementation of the Ethereum protocol. Quick way to download block data via geth.

LINK

ETH-block-by-date

Get Ethereum block number by a given date. Or blocks by a given period duration. Works well with Web3 node js.

LINK

Web3.js

Ethereum JavaScript API.

LINK

Web3.py

A python interface for interacting with the Ethereum blockchain and ecosystem. Based on Web3.js

LINK

XorFiles

Raid 5 - restore disks from other raid disks via XOR operation. Note this is just a simple xor between two files.

LINK

Xor-files

xor-files -r broken-disk3.img raid-disk1.img raid-disk2.img

Mdadm

mdadm is used to handle software raids on Linux. You can use this tool to create, build, assemble, rebuild, monitor any raid type on Linux. Dont forget the order of the disks is important when trying to assemble an already created raid array etc.

LINK

Mdadm create

mdadm --create /dev/md0 --level=5 --raid-devices=3 /dev/disk2 missing /dev/disk1

Mdadm loop

losetup loop1 raid-disk1.img