:triangular_flag_on_post: A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.
A CLI tool & library to enhance and speed up script/exploit writing for CTF players (or security researchers, bug bounty hunters, pentesters but mostly focused on CTF) by patching the String class to add a short syntax of usual code patterns. The philosophy is also to keep the library to be pure ruby (no dependencies) and not to re-implement what another library is already doing well (eg. xorcist for xor).
For example instead of writing:
require 'base64'
myvar = 'string'
myvar = Base64.strict_encode64(myvar)
Just write (shorter and easier to remember):
require 'ctf_party'
myvar = 'string'
myvar.to_b64!
Most of the methods are available as commands CLI tool:
$ ctf-party 'security' to_hex
7365637572697479
$ ctf-party 'NzQ2Zjc0NmY=' from_b64 hex2str str2bin
01110100011011110111010001101111
to_b64
, from_b64
, b64?
and bang versionsmd5
, sha1
, etc. and bang versionsflag
, flag!
, flag?
(apply/check a flag format)rot
, rot13
, rot_all
and bang versionshex2dec
, dec2hex
, to_hex
, from_hex
, str2hex
, hex2str
, hex2bin
, bin2hex
, from_hexip
, to_hexip
, etc. and bang versionsrandomcase
, alternatecase
and bang versionsurlencode
, urlencode_component
, urldecode
, urldecode_component
, htmlescape
, htmlunescape
and bang versionsto_bin
, from_bin
, str2bin
, bin2str
, hex2bin
, bin2hex
, etc. and bang versionsleet
and bang versiondec2str
, str2dec
, hex2dec
, dec2hex
and bang versionsulxor
, alxor
, urxor
, arxor
and bang versionsistrip
and bang versiondefang_ip
, defang_uri
, defang_domain
, defang_email
, refang_ip
, etc. and bang versionsipv4?
, ipv6?
, ip?
, uri?
, domain?
, email?
Homepage / Documentation: https://noraj.github.io/ctf-party/
Made by Alexandre ZANNI (@noraj). Forked from Orange-Cyberdefense/ctf-party.