GitXplorerGitXplorer
n

ctf-party

public
82 stars
7 forks
0 issues

Commits

List of commits on branch master.
Unverified
b0c58df68475f5e33b2c59a11e7989bbe3cadef0

build(deps-dev): bump yard from 0.9.36 to 0.9.37

ddependabot[bot] committed 4 months ago
Unverified
c52cabf12ac77d499885dd39fc491ec9811e3296

build(deps-dev): bump rubocop from 1.65.1 to 1.66.1

ddependabot[bot] committed 4 months ago
Unverified
722a95277fd311f8ad146bcd012b80f61dfefc65

build(deps): bump uri from 0.13.0 to 0.13.1

ddependabot[bot] committed 5 months ago
Unverified
b2ade202c47cb02459b9dd4e9f82777057cc8997

build(deps-dev): bump rexml from 3.3.4 to 3.3.6

ddependabot[bot] committed 5 months ago
Unverified
041041a5bf9189c87cb4ca0b914c8167630ed883

build(deps-dev): bump minitest from 5.25.0 to 5.25.1

ddependabot[bot] committed 5 months ago
Unverified
fa1770f6dd6b994f9ebdf1670d2fc65cd9eef627

build(deps-dev): bump minitest from 5.24.1 to 5.25.0

ddependabot[bot] committed 5 months ago

README

The README file for this repository.

ctf-party

Gem Version GitHub tag (latest SemVer) GitHub forks GitHub stars GitHub license Rawsec's CyberSecurity Inventory

Packaging status

What it is

A CLI tool & library to enhance and speed up script/exploit writing for CTF players (or security researchers, bug bounty hunters, pentesters but mostly focused on CTF) by patching the String class to add a short syntax of usual code patterns. The philosophy is also to keep the library to be pure ruby (no dependencies) and not to re-implement what another library is already doing well (eg. xorcist for xor).

For example instead of writing:

require 'base64'

myvar = 'string'
myvar = Base64.strict_encode64(myvar)

Just write (shorter and easier to remember):

require 'ctf_party'

myvar = 'string'
myvar.to_b64!

Most of the methods are available as commands CLI tool:

$ ctf-party 'security' to_hex
7365637572697479

$ ctf-party 'NzQ2Zjc0NmY=' from_b64 hex2str str2bin
01110100011011110111010001101111

Features

  • base64: to_b64, from_b64, b64? and bang versions
  • digest: md5, sha1, etc. and bang versions
  • flag: flag, flag!, flag? (apply/check a flag format)
  • rot: rot, rot13, rot_all and bang versions
  • hex: hex2dec, dec2hex, to_hex, from_hex, str2hex, hex2str, hex2bin, bin2hex, from_hexip, to_hexip, etc. and bang versions
  • case: randomcase, alternatecase and bang versions
  • cgi: urlencode, urlencode_component, urldecode, urldecode_component, htmlescape, htmlunescape and bang versions
  • bin: to_bin, from_bin, str2bin, bin2str, hex2bin, bin2hex, etc. and bang versions
  • leet: leet and bang version
  • dec: dec2str, str2dec, hex2dec, dec2hex and bang versions
  • xor: ulxor, alxor, urxor, arxor and bang versions
  • misc: istrip and bang version
  • defang: defang_ip, defang_uri, defang_domain, defang_email, refang_ip, etc. and bang versions
  • network: ipv4?, ipv6?, ip?, uri?, domain?, email?

References

Homepage / Documentation: https://noraj.github.io/ctf-party/

Author

Made by Alexandre ZANNI (@noraj). Forked from Orange-Cyberdefense/ctf-party.