Skip to content
This repository has been archived by the owner on Sep 2, 2024. It is now read-only.

🎏 A library to enhance and speed up script/exploit writing for CTF players

License

Notifications You must be signed in to change notification settings

Orange-Cyberdefense/ctf-party

Repository files navigation

ctf-party

Gem Version GitHub tag (latest SemVer) GitHub forks GitHub stars GitHub license Rawsec's CyberSecurity Inventory

Packaging status

What it is

A library to enhance and speed up script/exploit writing for CTF players (or security researchers, bug bounty hunters, pentesters but mostly focused on CTF) by patching the String class to add a short syntax of usual code patterns. The philosophy is also to keep the library to be pure ruby (no dependencies) and not to re-implement what another library is already doing well (eg. xorcist for xor).

For example instead of writing:

require 'base64'

myvar = 'string'
myvar = Base64.strict_encode64(myvar)

Just write (shorter and easier to remember):

require 'ctf_party'

myvar = 'string'
myvar.to_b64!

Features

  • base64: to_b64, to_b64!, from_b64, from_b64!, b64?
  • digest: md5, md5!, sha1, sha1!, etc.
  • flag: flag, flag!, flag? (apply/check a flag format)
  • rot: rot, rot!, rot13, rot13!
  • hex: hex2dec, dec2hex, to_hex, from_hex, hex2bin, bin2hex and bang versions

References

Homepage / Documentation: https://orange-cyberdefense.github.io/ctf-party/

Author

Made by Alexandre ZANNI (@noraj), pentester from Orange Cyberdefense.