Skip to content
A library to enhance and speed up script/exploit writing for CTF players
Ruby Shell
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
bin
docs
lib
test
.editorconfig
.gitignore
.rubocop.yml
.ruby-version
.yardopts
.yardopts-dev
Gemfile
Gemfile.lock
LICENSE.txt
README.md
Rakefile
ctf_party.gemspec

README.md

ctf-party

Gem Version GitHub tag (latest SemVer) GitHub forks GitHub stars GitHub license Rawsec's CyberSecurity Inventory

Packaging status

What it is

A library to enhance and speed up script/exploit writing for CTF players (or security researchers, bug bounty hunters, pentesters but mostly focused on CTF) by patching the String class to add a short syntax of usual code patterns. The philosophy is also to keep the library to be pure ruby (no dependencies) and not to re-implement what another library is already doing well (eg. xorcist for xor).

For example instead of writing:

require 'base64'

myvar = 'string'
myvar = Base64.strict_encode64(myvar)

Just write (shorter and easier to remember):

require 'ctf_party'

myvar = 'string'
myvar.to_b64!

Features

  • base64: to_b64, to_b64!, from_b64, from_b64!, b64?
  • digest: md5, md5!, sha1, sha1!, etc.
  • flag: flag, flag!, flag? (apply/check a flag format)
  • rot: rot, rot!, rot13, rot13!
  • hex: hex2dec, dec2hex, to_hex, from_hex and bang versions

References

Homepage / Documentation: https://orange-cyberdefense.github.io/ctf-party/

Author

Made by Alexandre ZANNI (@noraj), pentester from Orange Cyberdefense.

You can’t perform that action at this time.