Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
This repository was archived by the owner on Sep 2, 2024. It is now read-only.

🎏 A library to enhance and speed up script/exploit writing for CTF players

License

NotificationsYou must be signed in to change notification settings

Orange-Cyberdefense/ctf-party

Repository files navigation

Gem VersionGitHub tag (latest SemVer)GitHub forksGitHub starsGitHub licenseRawsec's CyberSecurity Inventory

Packaging status

What it is

A library to enhance and speed up script/exploit writing for CTF players (orsecurity researchers, bug bounty hunters, pentesters but mostly focused on CTF)by patching the String class to add a short syntax of usual code patterns.The philosophy is also to keep the library to be pure ruby (no dependencies)and not to re-implement what another library is already doing well(eg.xorcist for xor).

For example instead of writing:

require'base64'myvar='string'myvar=Base64.strict_encode64(myvar)

Just write (shorter and easier to remember):

require'ctf_party'myvar='string'myvar.to_b64!

Features

  • base64:to_b64,to_b64!,from_b64,from_b64!,b64?
  • digest:md5,md5!,sha1,sha1!, etc.
  • flag:flag,flag!,flag? (apply/check a flag format)
  • rot:rot,rot!,rot13,rot13!
  • hex:hex2dec,dec2hex,to_hex,from_hex,hex2bin,bin2hex and bang versions

References

Homepage / Documentation:https://orange-cyberdefense.github.io/ctf-party/

Author

Made by Alexandre ZANNI (@noraj), pentester from Orange Cyberdefense.

About

🎏 A library to enhance and speed up script/exploit writing for CTF players

Topics

Resources

License

Stars

Watchers

Forks

Contributors2

  •  
  •  

Languages


[8]ページ先頭

©2009-2025 Movatter.jp