Ciphers & Codes |
|
A page dedicated to simple text manipulation tools, which all can be replicated with just paper and pencil |
|
MP3Stego |
|
Hide information in MP3 files during the compression process |
|
Steghide |
|
A steganography program that is able to hide data in various kinds of image- and audio-files (JPEG, BMP, WAV and AU files) |
|
Foremost |
|
Finds stuff in binary files and recover it |
|
Exiftool |
|
reading, writing and editing meta information in a wide variety of files |
|
Xortool |
|
XOR analysis, guess the key length or key |
|
Pwntools |
|
CTF framework and exploit development library. Written in Python |
|
V0lt |
|
(outdated) Security CTF, Python style. Making CFT scripting easy in python |
|
Androguard |
|
Full python tool to play with Android files DEX, ODEX and APK |
|
Ctf_import |
|
Small library that allows you to run basic functions from stripped binaries cross platform |
|
Outguess |
|
Universal steganographic tool |
|
Reverse Shell |
|
Payloads All The Things- Reverse Shell Cheatsheet |
|
Reverse Shell #2 |
|
d4t4s3c - Reverse Shell Cheat Sheet |
|
Quipqiup |
|
An online tool for breaking substitution ciphers or vigenere ciphers (without key) |
|
Snow |
|
Whitespace Steganography Tool |
|
AperiSolve |
|
Online platform which performs layer analysis on images also uses zsteg, steghide, outguess, exiftool, binwalk, foremost and strings for deeper steganography analysis |
|
Searchsploit |
|
Command line search tool for Exploit-DB that also allows you to take a copy of Exploit Database with you, everywhere you go |
|
Dirbuster |
|
DirBuster is a multi threaded java application designed to brute force directories and files names on web/application servers |
|
Gobuster |
|
tool used to brute-force URIs, DNS, Virtual Host, Open Amazon S3 buckets |
|
Gobuster dir+session |
|
gobuster dir -u http://<ip_host> -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x php -c PHPSESSID=<session_value> |
|
Vigenere |
|
online tool breaks Vigenere ciphers without knowing the key |
|
Dirtycow |
|
Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux Kernel (Old exploit) 2.6.22 and below |
|
Fcrackzip |
|
A braindead program for cracking encrypted ZIP archives |
|
LinEnum |
|
Best scripted local Linux enumeration & privilege escalation checks |
|
Hackingtool |
|
ALL IN ONE Hacking Tool For Hackers (It's okay and works but i would use it just a yey an option for a tool) |
|
Stego-toolkit |
|
Collection of steganography tools - helps with CTF challenges |
|
CTFCrackTools |
|
China's first CTFTools framework (Use at your own risk hahah) |
|
Ciphey |
|
Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes |
|
Name-That-Hash |
|
Don't know what type of hash it is? Name That Hash will name that hash type! Identify MD5, SHA256 and 300+ other hashes |
|
Text Converter |
|
Text Converter converts text to other encodings or other formats. Supported formats include Base64, Quoted-Printable, URL encoding, HTML encoding, various types of text conversion and formatting, as well as hash calculations |
|
ASCII ANSI Table |
|
ASCII (American Standard Code for Information Interchange) is a 7-bit character set that contains characters from 0 to 127 |
|
Unicode Table |
|
Unicode, formally the Unicode Standard, is an information technology standard for the consistent encoding, representation, and handling of text expressed in most of the world's writing systems |
|
Steganabara |
|
Steganabara is a tool for stegano analysis (steganalysis). Steganabara has now matured and is very effective on visual steganos |
|
Cryptii |
|
Web app offering modular conversion, encoding and encryption online. Translations are done in the browser without any server interaction. Very handy CTF tool! |
|
Kali Linux |
|
Open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering |
|
CyberChef |
|
The best online tool for analysing and decoding data |
|
Pwninit |
|
pwninit - automate starting binary exploit challenges. |
|
Knock |
|
Simple python port knocking client |
|
Ffuf |
|
Fast web fuzzer written in Go |
|
Etherblob-explorer |
|
Search and extract blob files on the Ethereum Blockchain network |
|
Go-ethereum |
|
Official Go implementation of the Ethereum protocol. Quick way to download block data via geth. |
|
ETH-block-by-date |
|
Get Ethereum block number by a given date. Or blocks by a given period duration. Works well with Web3 node js. |
|
Web3.js |
|
Ethereum JavaScript API. |
|
Web3.py |
|
A python interface for interacting with the Ethereum blockchain and ecosystem. Based on Web3.js |
|
XorFiles |
|
Raid 5 - restore disks from other raid disks via XOR operation. Note this is just a simple xor between two files. |
|
Xor-files |
|
xor-files -r broken-disk3.img raid-disk1.img raid-disk2.img |
|
Mdadm |
|
mdadm is used to handle software raids on Linux. You can use this tool to create, build, assemble, rebuild, monitor any raid type on Linux. Dont forget the order of the disks is important when trying to assemble an already created raid array etc. |
|
Mdadm create |
|
mdadm --create /dev/md0 --level=5 --raid-devices=3 /dev/disk2 missing /dev/disk1 |
|
Mdadm loop |
|
losetup loop1 raid-disk1.img |
|