Fully automated decryption/decoding/cracking tool using natural language processing & artificial intelligence, along with some common sense. Input encrypted text, get the decrypted text back.
natural-language-processing cryptography cipher cpp hacking artificial-intelligence pentesting ctf hashes encodings decryption hacktoberfest ctf-tools encryptions deep-neural-network cyberchef-magicThis project is a Docker image useful for solving Steganography challenges as those you can find at CTF platforms like hackthebox.eu. The image comes pre-installed with many popular tools (see list below) and several screening scripts you can use check simple things (for instance, run check_jpg.sh image.jpg to get a report for a JPG file). First make sure you have Docker installed (how to). Then you can use the shell scripts bin/buid.sh and bin/run.sh in this repo to build the image and run the container. You will be dropped into a bash shell inside the container. It will have the data folder mounted, into which you can put the files to analyze.
docker-image steganography ctf-toolsYou can also add a custom libc to your database. Find all the libc's in the database that have the given names at the given addresses. Only the last 12 bits are checked, because randomization usually works on page size level.
pwn libc offsets ctf ctf-toolsA virtual host scanner that can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages. First presented at SecTalks BNE in September 2017 (slidedeck). Dependencies will then be installed and VHostScan will be added to your path. If there is an issue regarding running python3 setup.py build_ext, you will need to reinstall numpy using pip uninstall numpy and pip install numpy==1.12.0. This should resolve the issue as there are sometimes issues with numpy being installed through setup.py.
security-audit penetration-testing penetration-test virtual-hosts web-application-security discovery-service hacking hacking-tool virtual-host vhost vhosts security-tools security hackthebox oscp ctf-tools offensive-security bugbounty reverse-lookups scannerzio is an easy-to-use io library for pwning development, supporting an unified interface for local process pwning and TCP socket io. The primary goal of zio is to provide unified io interface between process stdin/stdout and TCP socket io. So when you have done local pwning development, you only need to change the io target to pwn the remote server.
pwntools zio io-library pwnable ctf-toolsHigh-density hex viewer focused on visual pattern matching on <1MB binaries. Binary Editor BZ has this covered on Windows. This is a Unix version you can quickly extend and hack on. Supports live code reload for smooth domain-specific prototyping.
hex-editor reverse-engineering ctf-toolsEverything needed for doing CTFs
ctf-tools penetration-testing ctf-notes hacking enumeration msf notes oscp scriptCollection of small security tools created mostly in Perl during CTFs, pentests and so on
pentesting ctf bugbounty hacking ctf-tools security-tools tricksknary is a canary token server that notifies a Slack channel when incoming HTTP(S) or DNS requests match a given domain or any of its subdomains. It also supports functionality useful in offensive engagements including subdomain blacklisting. Redteamers use canaries to be notified when someone (or something) attempts to interact with a server they control. Canaries help provide visibility over processes that were previously unknown. They can help find areas to probe for RFI or SSRF vulnerabilities, disclose previously unknown servers, provide evidence of a MitM device, or just announce someone interacting with your server.
pentesting penetration-testing canary security-tools offensive-security slackbot bugbounty ctf-toolsA tool for fuzzing for ports that allow outgoing connections
ctf-tools pentest-tool pentest-scripts pentesting-networks python3 security-tools firewall fuzzerCollection of simple security tools created in Python.
pentesting hacking bugbounty itsecurity ctf ctf-tools infosec webappsec scanner security-tools security-testing bug-bounty bug-bountiesBaseCrack is a tool written in Python that can decode all alphanumeric base encoding schemes. This tool can accept single user input, multiple inputs from a file, input from argument, multi-encoded bases, bases in image EXIF data, bases on images with OCR and decode them incredibly fast. Decode Base16, Base32, Base36, Base58, Base62, Base64, Base64Url, Base85, Ascii85, Base91, Base92 and more with the best base encoding scheme decoding tool in town. It's useful for CTFs, Bug Bounty Hunting, and Cryptography (NOTE: Base Encoding is not an "Encryption" hence it doesn't fall under the Cryptography category, it's useful as base scheme encoding are often used in cryptography tools/projects/challenges).
cryptography base64 tool decoder base32 base58 base16 decode infosec ctf capture-the-flag bugbounty base ctf-tools encoder-decoder decoders cryptography-tools decode-strings cryptography-projectThis tool might help your team to create challenges following a predefined format. This project was, initially, created for managing file for INS'hAck 2017 event. You can find challenges and writeups of the past editions of INS'hAck here.
ctf-tools ctf-frameworkN.B. python3-pip package is required to install dependencies, be sure to have it installed.
security jwt penetration-testing jsonwebtoken jwt-cracker pentesting ctf pentest ctf-tools security-tools websecurity pentest-tool jwks jwt-security pentesting-tools penetration-testing-tools jku x5u-injection jwt-exploit
We have large collection of open source products. Follow the tags from
Tag Cloud >>
Open source products are scattered around the web. Please provide information
about the open source projects you own / you use.
Add Projects.