A CLI tool & library to enhance and speed up script/exploit writing for CTF players (or security researchers, bug bounty hunters, pentesters but mostly focused on CTF) by patching the String class to add a short syntax of usual code patterns. The philosophy is also to keep the library to be pure ruby (no dependencies) and not to re-implement what another library is already doing well (eg. xorcist for xor).
For example instead of writing:
require 'base64'
myvar = 'string'
myvar = Base64.strict_encode64(myvar)
Just write (shorter and easier to remember):
require 'ctf_party'
myvar = 'string'
myvar.to_b64!
Most of the methods are available as commands CLI tool:
$ ctf-party 'security' to_hex
7365637572697479
$ ctf-party 'NzQ2Zjc0NmY=' from_b64 hex2str str2bin
01110100011011110111010001101111
- base64:
to_b64
,from_b64
,b64?
and bang versions - digest:
md5
,sha1
, etc. and bang versions - flag:
flag
,flag!
,flag?
(apply/check a flag format) - rot:
rot
,rot13
,rot_all
and bang versions - hex:
hex2dec
,dec2hex
,to_hex
,from_hex
,str2hex
,hex2str
,hex2bin
,bin2hex
,from_hexip
,to_hexip
, etc. and bang versions - case:
randomcase
,alternatecase
and bang versions - cgi:
urlencode
,urlencode_component
,urldecode
,urldecode_component
,htmlescape
,htmlunescape
and bang versions - bin:
to_bin
,from_bin
,str2bin
,bin2str
,hex2bin
,bin2hex
, etc. and bang versions - leet:
leet
and bang version - dec:
dec2str
,str2dec
,hex2dec
,dec2hex
and bang versions - xor:
ulxor
,alxor
,urxor
,arxor
and bang versions - misc:
istrip
and bang version - defang:
defang_ip
,defang_uri
,defang_domain
,defang_email
,refang_ip
, etc. and bang versions - network:
ipv4?
,ipv6?
,ip?
,uri?
,domain?
,email?
Homepage / Documentation: https://noraj.github.io/ctf-party/
Made by Alexandre ZANNI (@noraj). Forked from Orange-Cyberdefense/ctf-party.