https://ww1.microchip.com/downloads/en/devicedoc/atmel-0856-avr-instruction-set-manual.pdf
CTF | Cheatsheet | DatasetThis website provides reference documentation of the AVR instruction set, which is used for Arduino boards. More information is contained in the AVR Assembler documentation.
https://cloud.binary.ninja/
CTF | Reverse Engineering | ToolThe cloud version of binary ninja allows free reversing in the cloud. It has a real-time collaboration feature.
https://github.com/binref/refinery
CTF | ToolBinary Refinery is a collection of Python scripts for transforming data. It is similar in concept to CyberChef but runs locally. For example, Binary Refinery supports base64 or hex transformations, hash data, or packing values into binary.
https://github.com/sajjadium/ctf-archives
CTF | DatasetThe repository contains an archive of many CTF challenges of the last years. This is a good resource when trying to find old challenges or learn exploit techniques based on writeups.
https://cinsects.de/category/resources.html
CTF | ToolCInsects is a German CTF team. They collect resources of tool, tutorials, and documentation around CTF tools and exploitation.
https://cryptii.com/
CTF | ToolThe website offers an interactive tool to encode and encrypt data. It presents a visual pipeline through which the data travels, being transformed in each step. It is conceptually similar to CyberChef, but with a focus on encryption.
https://gchq.github.io/CyberChef/
CTF | ToolThe CyberChef is a website which provides many recipes and makes it easy to combine them. The recipes are small input/output steps, similar to UNIX tools, and cover a large area of topics, like data formats, encoding, encryption, networking, hashing, compression, etc. The main use case is making it easier in CTFs to chain simple operations together, like processing encoded text.
https://archive.ooo/
CTF | DatasetThe website provides a playable archive of old DEFCON challenges. The challenges are tagged by category and by original CTF.
The files are available on GitHub.
https://imaginaryctf.org/
CTFThe website publishes a new CTF challenge every day.
https://debin.ai
C | CTF | Reverse Engineering | ToolDebin is a tool to predict the debug information of stripped binaries. It only works reliable with C programs, as this is the only dataset it was trained on. It might be useful to use the website for jeopardy CTFs.
https://github.com/beurtschipper/Depix
CTF | ToolDepix allows reverting pixelization and recover the original text. It works for pixelated images created using linear box filters. The recovery process is not always perfect, but good enough to produce readable text.
https://dogbolt.org/
CTF | Tool | x86Dogbolt is an online interactive decompiler explorer. A binary can be uploaded and the decompiled C-like output of multiple decompilers compared. The website collects all uploaded binaries, so be wary of which files to upload. The big advantage of the website is having so many available decompilers (angr, Binary Ninja, Boomerang, Ghidra, IDA Pro, REC Studio, Reko, RetDec, Snowman). A downside is that no alterations to the decompilation are possible, for example, to provide function signatures.
https://github.com/deiv/driftnet
CTF | Network | ToolDriftnet watches network traffic, and picks out and displays JPEG and GIF images for display.
https://ghidra-sre.org/
CTF | Reverse Engineering | ToolGhidra software reverse engineering (SRE) framework and IDA Pro alternative.
https://godbolt.org/
CTF | Tool | x86The Godbolt compiler explorer allows the user to compile a function and see the corresponding assembly code. It can highlight matching parts in the language and assembly, making it easy to understand how individual expressions are compiled. It supports common languages like C, C++, Go, Rust. It can also work with assembler and LLVM IR.
Another nice feature is, that it can show statistics about assembler code, like needed cycles, instructions, and which resources the instructions need. This uses the LLVM Machine Code Analyzer.
http://exif.regex.info/exif.cgi
CTF | EXIF | Image | ToolThe online Image Metadata Viewer shows the EXIF information from uploaded files or files by URL. It supports a wide range of metadata, such as XMP, EXIF, IPTC, and MakerNotes.
https://github.com/openwall/john
CTF | Hash | Password | ToolJohn the Ripper is THE tool to brute force passwords and password hashes. It is very fast in calculating hashes with support of GPU acceleration and supports a wide range of different hash formats.
CTF | Cheatsheet | Dataset | x86These websites provided an overview of the Linux systemcall interface by listing the syscall numbers, their meanings, and their arguments.
https://default-password.info/
CTF | Dataset | PasswordThe website features a large list of default passwords found in routers and IoT devices. The data is sorted by manufacturer and can be searched.
https://github.com/owasp-amass/amass
CTF | DNS | ToolThe OWASP Amass tool suite obtains subdomain names by scraping data sources, recursive brute forcing, crawling web archives, permuting/altering names and reverse DNS sweeping. Additionally, Amass uses the IP addresses obtained during resolution to discover associated netblocks and ASNs. All the information is then used to build maps of the target networks.
https://defuse.ca/online-x86-assembler.htm
CTF | Tool | x86Website allowing assembly and disassembly of x86 and x64 code.
https://onlinedisassembler.com/odaweb/
ARM | CTF | Reverse Engineering | Tool | x86The online disassembler can disassemble a wide range of binary formats and platforms. It can disassemble freestanding bytes too. It provides a disassembly view, a graph view, a symbols and a function viewer.
CTF | Dataset | Hash | PasswordThese websites have access to large rainbow tables and allow quick access to known weak hashes.
https://overthewire.org/wargames/
CTF | Dataset | ToolOver The Wire provides with the wargames many different challenges, to learn exploitations of different things. There are different wargames based on skill and required tooling. In each level, the user has to retrieve a flag to procede to the next level.
https://github.com/Ignitetechnologies/Privilege-Escalation
CTF | DatasetThe repo contains a curated list of various ways to perform privilege escalation. It is sorted by different attack vectors.
https://www.revshells.com/
CTF | ToolThe website provides a generator for quickly configuring a reverse shell. After entering an IP address and port number, the website shows code snippets for many languages. It also provides the option to create bind shells or use the metasploit framework.
https://github.com/RsaCtfTool/RsaCtfTool
CTF | Certificate | ToolThe RsaCtfTool is a tool supporting working with RSA keys. The main focus lies in a wide range of known attacks which are implemented and easy to use with it. This makes it suitable for CTFs, especially Jeopardies.
https://npmccallum.gitlab.io/post/foreign-architecture-docker/
CTF | Docker | ToolSometimes it is necessary to run Docker containers for a different CPU architecture. This Docker container makes it possible to run other Docker containers with a different architecture. It works by using binfmt_misc
, a Linux kernel feature to run files with interpreters, and installs QEMU binaries for different architectures.
https://github.com/DaWouw/SCWF
CTF | ToolThe website offers a large variety of crypto implementations which can be tested. It is helpful to solve unknown crypto challenges during CTFs. It is similar in concept to the CyberChef, but only for crypto.
https://github.com/trickest/cve
CTF | CVE | DatasetThe GitHub repository collects CVEs and proof-of-concept (PoC) exploits for them. It is a good resource to play around with sample exploits.
https://vulnerablecontainers.org/
CTF | Dataset | DockerThe website lists docker containers from Docker Hub with known vulnerabilities in it. The top 1000 docker containers from Docker Hub are regularly scanned with Trivy and the results reported here.
A similar tool to scan for vulnerable containers is Clair scanner.
https://kaiiyer.github.io/awesome-vulnerable/
CTFA curated list of vulnerable apps and systems which can be used as penetration testing practice lab. This list aims to help starters as well as pros to test out and enhance their penetration skills.
https://ciphereditor.com/
CTF | ToolThe website offers an interactive tool to encode and encrypt data. It is based around blocks performing individual operations. These block can then pull or push their input/outputs from variables. This allows chaining them together to achieve more complex operations It is conceptually similar to CyberChef, but with a focus on encryption.
https://angr.io/
CTF | Python | Reverse Engineering | Toolangr is a python framework for analyzing binaries. It combines both static and dynamic symbolic ("concolic") analysis, making it applicable to a variety of tasks.
https://github.com/ReFirmLabs/binwalk
CTF | ToolBinwalk is a binary file analysis tool. It works by traversing a file and looking for potentially embedded files. These embedded files can also be extraced.
https://github.com/m57/dnsteal
CTF | DNS | Tooldnsteal provides a fake DNS server and encodes a file into a series of DNS requests. The fake DNS server then reassembles the file. This can be used to hide the file exfiltration as DNS traffic, however, since it doesn't use the default DNS server it is quite noisy.
https://github.com/shellphish/how2heap
CTF | TutorialThis repo is for learning various heap exploitation techniques. We use Ubuntu's Libc releases as the gold-standard. Each technique is verified to work on corresponding Ubuntu releases. You can run apt source libc6 to download the source code of the Libc your are using on Debian-based operating system. You can also click ⏵ to debug the technique in your browser using gdb.
Besides the hep exploitation examples the repo also contains references to helpful tools and further information about heap exploitation.
CTF | Dataset | Reverse EngineeringOnline interface to find a libc database by function offsets. They are powered by the libc-database repository.
https://github.com/zardus/preeny
CTF | Toolpreeny helps pwning binaries by disabling many annoying functions such as random
or alarm
. It does so by providing different LDPRELOAD
-able libraries for those library functions.
https://pwntools.readthedocs.io/en/stable/
CTF | Toolpwntools is one of THE Python tools needed during a CTF. It is useful for both jeopardy and attack-defense CTFs. It provides common abstractions, like connecting to a local or remote program and simplifying I/O. Addtionally, it provides helpers for many exploitation techniques, such as ROP, shellcode, and leaking memory.
https://github.com/kontaxis/snidump
CTF | Network | ToolThis is a tcpdump-like program for printing TLS SNI and HTTP/1.1 Host fields in live or captured traffic.
CTF | Cheatsheet | Dataset | x86These websites provide reference documentation of the x86 instruction set: