Project

ctf-party

0.03
A long-lived project that still receives updates
A CLI tool & library to enhance and speed up script/exploit writing for CTF players (or security researchers, bug bounty hunters, pentesters but mostly focused on CTF) by patching the String class to add a short syntax of usual code patterns. Methods for base64, digest (hash), flag, rot (Caesar), hexadecimal, case, cgi (URL encoding/decoding, HTML escaping/unescaping), binary, leet (1337), decimal, XOR, whitespace strip, IP/URI/domain/email defang/refang.
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
 Dependencies

Runtime

~> 1.0, >= 1.0.2
~> 0.6
~> 0.2.0
 Project Readme

ctf-party

Gem Version GitHub tag (latest SemVer) GitHub forks GitHub stars GitHub license Rawsec's CyberSecurity Inventory

Packaging status

What it is

A CLI tool & library to enhance and speed up script/exploit writing for CTF players (or security researchers, bug bounty hunters, pentesters but mostly focused on CTF) by patching the String class to add a short syntax of usual code patterns. The philosophy is also to keep the library to be pure native ruby (no dependencies) and not to re-implement what another library is already doing well.

For example instead of writing:

require 'base64'

myvar = 'string'
myvar = Base64.strict_encode64(myvar)

Just write (shorter and easier to remember):

require 'ctf_party'

myvar = 'string'
myvar.to_b64!

Most of the methods are available as commands CLI tool:

$ ctf-party 'security' to_hex
7365637572697479

$ ctf-party 'NzQ2Zjc0NmY=' from_b64 hex2str str2bin
01110100011011110111010001101111

Features

See here.

References

Homepage / Documentation.

Author

Made by Alexandre ZANNI (@noraj). Forked from Orange-Cyberdefense/ctf-party.