Project

ctf-party

0.03
The project is in a healthy, maintained state
A CLI tool & library to enhance and speed up script/exploit writing for CTF players (or security researchers, bug bounty hunters, pentesters but mostly focused on CTF) by patching the String class to add a short syntax of usual code patterns. Methods for base64, digest (hash), flag, rot (Caesar), hexadecimal, case, cgi (URL encoding/decoding, HTML escaping/unescaping), binary, leet (1337), decimal, XOR, whitespace strip, IP/URI/domain/email defang/refang.
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
 Dependencies

Runtime

>= 0.12.1, < 0.14.0
~> 0.6
 Project Readme

ctf-party

Gem Version GitHub tag (latest SemVer) GitHub forks GitHub stars GitHub license Rawsec's CyberSecurity Inventory

Packaging status

What it is

A CLI tool & library to enhance and speed up script/exploit writing for CTF players (or security researchers, bug bounty hunters, pentesters but mostly focused on CTF) by patching the String class to add a short syntax of usual code patterns. The philosophy is also to keep the library to be pure ruby (no dependencies) and not to re-implement what another library is already doing well (eg. xorcist for xor).

For example instead of writing:

require 'base64'

myvar = 'string'
myvar = Base64.strict_encode64(myvar)

Just write (shorter and easier to remember):

require 'ctf_party'

myvar = 'string'
myvar.to_b64!

Most of the methods are available as commands CLI tool:

$ ctf-party 'security' to_hex
7365637572697479

$ ctf-party 'NzQ2Zjc0NmY=' from_b64 hex2str str2bin
01110100011011110111010001101111

Features

  • base64: to_b64, from_b64, b64? and bang versions
  • digest: md5, sha1, etc. and bang versions
  • flag: flag, flag!, flag? (apply/check a flag format)
  • rot: rot, rot13, rot_all and bang versions
  • hex: hex2dec, dec2hex, to_hex, from_hex, str2hex, hex2str, hex2bin, bin2hex, from_hexip, to_hexip, etc. and bang versions
  • case: randomcase, alternatecase and bang versions
  • cgi: urlencode, urlencode_component, urldecode, urldecode_component, htmlescape, htmlunescape and bang versions
  • bin: to_bin, from_bin, str2bin, bin2str, hex2bin, bin2hex, etc. and bang versions
  • leet: leet and bang version
  • dec: dec2str, str2dec, hex2dec, dec2hex and bang versions
  • xor: ulxor, alxor, urxor, arxor and bang versions
  • misc: istrip and bang version
  • defang: defang_ip, defang_uri, defang_domain, defang_email, refang_ip, etc. and bang versions
  • network: ipv4?, ipv6?, ip?, uri?, domain?, email?

References

Homepage / Documentation: https://noraj.github.io/ctf-party/

Author

Made by Alexandre ZANNI (@noraj). Forked from Orange-Cyberdefense/ctf-party.