Skip to content

Latest commit

 

History

History
386 lines (300 loc) · 40.8 KB

README.md

File metadata and controls

386 lines (300 loc) · 40.8 KB

Cybersecurity and CTF Resource Book for those who need

This repository compiles an extensive collection of cybersecurity tools, resources, and CTF (Capture the Flag) practice platforms for anyone involved in digital security


Introduction

This guide aims to be your ultimate reference, whether you're prepping for a CTF competition, strengthening your pentesting toolkit, or learning cybersecurity essentials. Organized by categories, each section covers tools, their functions, and direct links to resources. This format allows you to easily locate the tools you need, understand their capabilities, and access them instantly.

How to Use This Guide

Each section provides a focused list of tools, organized by their category, such as OSINT (Open Source Intelligence), steganography, reverse engineering, and more. Here’s how you can make the most out of each category in this guide:

  • Identify Your Objective: Whether you’re looking for exploitation tools, malware analysis frameworks, or OSINT utilities, navigate to the relevant section in the guide to find the tools specifically curated for that purpose.
  • Direct Links: Each tool includes a direct link for easy access. Just click to go straight to the download or official page.
  • Combine Tools for Comprehensive Use: In many cases, you may need to combine tools from various categories. For example, if you're working on a web security assessment, you might need to pull tools from both the "Penetration Testing" and "Web Vulnerability Scanners" sections.
  • Explore Platforms for Skill Development: Check out CTF platforms like Hack The Box and TryHackMe for practical, hands-on exercises that incorporate many of these tools.

Here’s a breakdown of the main categories and how to best utilize each:

1. OSINT (Open Source Intelligence)

These tools are essential for reconnaissance and data gathering. Start with Shodan or Censys to scan for internet-connected devices. Use theHarvester to gather emails and subdomains, while Maltego helps map and visualize relationships. Combine tools like Recon-ng and SpiderFoot for a complete view of your target's digital footprint.

2. Steganography

For CTFs or forensic analysis, Steghide allows for data concealment and extraction from images, and zsteg is excellent for hidden data in PNG/BMP files. AperiSolve and StegSolve offer online and local analysis of hidden image content, while ExifTool reveals metadata, often containing valuable information for investigations.

3. Anonymity and Privacy

To maintain anonymity, start with Tor Browser for browsing and Tails OS as a secure operating system. ProtonMail and Signal provide encrypted communication, while Orbot and AnonAddy offer anonymous web browsing and email forwarding. These tools help you stay untraceable and protect sensitive information.

4. Exploitation and Reverse Shells

For exploitation, use Metasploit for payload and exploit delivery, and GTFOBins for privilege escalation on Unix. PayloadsAllTheThings offers a vast repository of payloads, and RevShells simplifies generating reverse shell payloads. MSFvenom is useful for custom payload generation, while Nishang aids in PowerShell-based exploitation.

5. Cryptography and Hash Cracking

For cracking passwords or cryptography challenges, Hashcat and John the Ripper are powerful tools. CyberChef provides extensive encoding, encryption, and data analysis, while Ciphey automates decryption tasks. Use CrackStation for online hash cracking, and Hash-Identifier to determine hash types, making cryptanalysis more manageable.

6. Penetration Testing

For penetration testing, Nmap is essential for network discovery, Wireshark for packet analysis, Burp Suite for web vulnerabilities, and SQLMap for SQL injection exploitation. Use Nikto and Dirbuster for web content and server scanning, Hydra for network logon brute-forcing, and Impacket for managing network protocols during exploitation.

7. Red and Blue Team Tools

Red Team: For offensive operations, Cobalt Strike and BloodHound are invaluable for adversary simulations and Active Directory mapping. Tools like Empire and Sliver support post-exploitation, while Mimikatz and SharpHound handle credential dumping and Active Directory enumeration. Obfuscators like PEzor and ScareCrow help evade detection.

Blue Team: For defense, Security Onion and Wazuh provide intrusion detection and monitoring. Suricata and TheHive support threat detection and incident response, while Velociraptor aids in endpoint visibility. ELK Stack is excellent for managing and analyzing logs to track potential threats.

8. CTF and Training Platforms

This section offers CTF platforms like Hack The Box and TryHackMe for hands-on training, PicoCTF and OverTheWire for beginner to intermediate challenges, and Root Me for web and binary exploitation. CTFtime helps track global events, and VulnHub provides vulnerable virtual machines for practice. Use these to build practical skills in a controlled environment.

9. Cheat Sheets and Reference

Quick references like PayloadsAllTheThings and HackTricks are invaluable for live challenges, offering extensive payload lists and techniques. GTFOBins provides privilege escalation techniques, while Linux and Windows Privilege Escalation guides give targeted resources for each operating system. For reverse engineering, Reverse Engineering Cheat Sheet provides quick tips, and Pentest Monkey is a great go-to for shell and payload references.

10. Extra CTF Tools

Specialized tools like PwnTools and Angr assist in exploit development and binary analysis. Qiling supports cross-platform emulation for reverse engineering, while ROPgadget and OneGadget help locate gadgets for ROP chain building. For Android CTF challenges, Apktool enables APK decompilation. SecLists and Insomni'hack payloads provide payloads and wordlists, while CyberChef and Cryptool aid in cryptography challenges.



1. Open Source Intelligence (OSINT)

Tool Description Link
Shodan Search engine for internet-connected devices. shodan.io
Censys Internet-wide scanning and data analysis platform. censys.io
theHarvester Tool to gather emails, subdomains, hosts, and more. GitHub
Maltego Data mining and link analysis platform for intelligence gathering. maltego.com
OSINT Framework Categorized collection of OSINT resources. osintframework.com
Recon-ng Web reconnaissance tool with various OSINT modules. GitHub
SpiderFoot OSINT automation tool for threat intelligence gathering. spiderfoot.net
Amass Tool for in-depth domain mapping and DNS enumeration. GitHub

2. Steganography Tools

Tool Description Link
Steghide Hide data in images and audio files. SourceForge
AperiSolve Online image steganography analyzer. aperisolve.com
Binwalk Extract data from binary files; often used for embedded files. GitHub
ExifTool Read, write, and edit file metadata, often used in forensics. exiftool.org
zsteg PNG/BMP analysis tool for finding hidden data. GitHub
StegOnline Web-based steganography tool for encoding/decoding images. stegonline.georgeom.net
OpenStego Open-source tool for image steganography with encryption options. openstego.com
OutGuess Universal steganographic tool for JPEG files. freebsd.org

3. Anonymous Communication & Identity

Tool Description Link
Tor Browser Browse the internet anonymously, routing traffic through Tor. torproject.org
ProtonMail Encrypted email service with strong privacy policies. protonmail.com
Tails OS Live operating system focused on privacy; leaves no trace. tails.boum.org
Signal Secure, end-to-end encrypted messaging app. signal.org
Orbot Tor proxy for Android devices, enabling anonymous browsing. guardianproject.info
AnonAddy Anonymous email forwarding to protect real email address. anonaddy.com
Guerrilla Mail Disposable, temporary email service. guerrillamail.com
Mailinator Public, disposable email system for quick registrations. mailinator.com

4. Reverse Shells & Exploits

Tool Description Link
Metasploit Full exploitation framework. metasploit.com
GTFOBins Unix binaries for privilege escalation. gtfobins.github.io
SearchSploit CLI search for Exploit Database. GitHub
PayloadsAllTheThings Comprehensive collection of payloads and bypasses. GitHub
RevShells Generate reverse shell payloads in multiple languages. revshells.com
MSFvenom Command-line payload generation tool for Metasploit. NetSec
Nishang PowerShell for penetration testing and red teaming. GitHub
Covenant C2 framework with .NET capabilities. GitHub

5. Cryptography & Hash Cracking

Tool Description Link
Hashcat High-performance password cracker, supporting GPU acceleration. hashcat.net
John the Ripper Popular open-source password cracker. openwall.com/john
CyberChef Versatile web-based tool for encryption, encoding, and data analysis. cyberchef.io
Ciphey Automated decryption tool that works without a password. GitHub
CrackStation Online password hash cracking using large databases. crackstation.net
Hash-Identifier Tool to identify the type of hash used. GitHub
Hydra Network logon cracker supporting numerous protocols. GitHub
RSA Tool Tool for RSA encryption and decryption. rsatool.org

6. Penetration Testing Tools

Tool Description Link
Nmap Network discovery and security auditing. nmap.org
Wireshark Network protocol analyzer. wireshark.org
Burp Suite Web vulnerability scanner and proxy tool. portswigger.net
SQLMap SQL injection automation tool. sqlmap.org
Hydra Network logon cracker for numerous protocols. GitHub
Nikto Web server scanner for known vulnerabilities. cirt.net
Aircrack-ng Suite for WiFi network security assessment. aircrack-ng.org
Impacket Python library for working with network protocols. GitHub

7. Red Team Tools

Tool Description Link
Cobalt Strike Adversary simulation and red team operations. cobaltstrike.com
BloodHound AD enumeration and mapping. GitHub
Empire Post-exploitation framework. GitHub
Mimikatz Credential dumping tool. GitHub
Sliver Open-source C2 platform for adversary emulation. GitHub
SharpHound Data collector for BloodHound, focusing on AD enumeration. GitHub
SilentTrinity Post-exploitation framework leveraging IronPython. GitHub
Merlin Cross-platform post-exploitation C2 tool. GitHub

8. Blue Team Tools

Tool Description Link
Security Onion Linux distro for intrusion detection and monitoring. securityonion.net
Wazuh Open-source security monitoring platform. wazuh.com
Suricata Network threat detection engine. suricata.io
ELK Stack Log management and analytics platform. elastic.co
Zeek Network monitoring and analysis framework. zeek.org
Velociraptor Endpoint visibility and forensic analysis tool. GitHub
MISP Open-source threat intelligence platform. misp-project.org
TheHive Scalable incident response platform. thehive-project.org

9. Malware Analysis Tools

Tool Description Link
Ghidra Open-source reverse engineering tool developed by the NSA. ghidra-sre.org
IDA Pro Leading disassembler and debugger for software analysis. hex-rays.com
Remnux Linux toolkit for reverse engineering and malware analysis. remnux.org
Cuckoo Sandbox Automated malware analysis sandbox environment. cuckoosandbox.org
x64dbg Open-source debugger for x64/x32 Windows binaries. x64dbg.com
Radare2 Powerful open-source framework for reverse engineering. rada.re
PE Studio Portable executable analysis tool for malware forensics. winitor.com
ANY.RUN Interactive online malware sandbox for real-time analysis. any.run

10. CTF Platforms and Training Resources

Platform Description Link
Hack The Box CTF platform with labs for hands-on cybersecurity training. hackthebox.com
TryHackMe Beginner-friendly platform with guided labs and challenges. tryhackme.com
PicoCTF CTF platform targeting students and beginners. picoctf.com
OverTheWire Wargames for learning Linux and cybersecurity basics. overthewire.org
Root Me Challenges across various hacking domains for skill building. root-me.org
CTFtime Calendar and ranking of global CTF events. ctftime.org
VulnHub Download vulnerable virtual machines for practice. vulnhub.com
PentesterLab Paid platform offering in-depth labs on web and network security. pentesterlab.com

11. File Transfer & Sharing

Tool Description Link
OnionShare Share files securely and anonymously over Tor. onionshare.org
Syncthing Decentralized file synchronization across devices. syncthing.net
FilePizza Peer-to-peer file sharing via WebRTC; no server storage. file.pizza
Wormhole Encrypted file sharing that auto-deletes after transfer. wormhole.app
ToffeeShare Direct, encrypted file sharing without middlemen. toffeeshare.com
Transfer.sh Command-line-friendly file sharing with encryption options. transfer.sh

12. Reverse Engineering Tools

Tool Description Link
Binary Ninja Reverse engineering platform for complex binary analysis. binary.ninja
Cutter GUI front-end for Radare2, suitable for beginners. cutter.re
OllyDbg Classic 32-bit debugger popular for Windows reverse engineering. ollydbg.de
Frida Dynamic instrumentation toolkit for testing application behaviors. frida.re
Apktool Reverse-engineering tool for Android APK files. GitHub
Angr Binary analysis framework useful for symbolic execution. angr.io
Radare2 Full reverse engineering and binary analysis suite. rada.re
WinDbg Microsoft’s debugger for Windows applications and drivers. docs.microsoft.com

13. Web Vulnerability Scanners

Tool Description Link
OWASP ZAP Comprehensive open-source web application security scanner. zaproxy.org
Nikto Scanner for known vulnerabilities on web servers. cirt.net
W3AF Web application attack and audit framework. w3af.org
Skipfish Security reconnaissance tool for web applications. GitHub
Acunetix Advanced automated web application vulnerability scanner. acunetix.com
Arachni Modular web application security scanner framework. arachni-scanner.com
Burp Suite Web vulnerability scanning and exploitation platform. portswigger.net
Wapiti Open-source web application vulnerability scanner. wapiti.sourceforge.io

14. Password Managers

Tool Description Link
KeePassXC Open-source password manager. keepassxc.org
Bitwarden Secure, open-source password management. bitwarden.com
LastPass Password vault and manager. lastpass.com
1Password Password manager and digital vault. 1password.com

15. Cheat Sheets

Resource Description Link
PayloadsAllTheThings Collection of payloads for various pentesting scenarios. GitHub
HackTricks Tips, tricks, and cheatsheets for penetration testing. book.hacktricks.xyz
GTFOBins Unix binaries that help with privilege escalation. gtfobins.github.io
Linux Privilege Escalation Guide and resources for escalating privileges on Linux. GitHub
Windows Privilege Escalation Comprehensive cheatsheet for privilege escalation on Windows. GitHub
Reverse Engineering Cheat Sheet Handy reference for common reverse engineering tasks. GitHub
PenTest Monkey Cheatsheets for reverse shells and more. pentestmonkey.net

16. Learning Resources

Resource Description Link
Cybrary Free IT and cybersecurity courses. cybrary.it
CTF Field Guide by Trail of Bits Comprehensive guide for CTF prep. trailofbits.com
OverTheWire Wargames focused on Linux and security concepts. overthewire.org
Hack The Box Hands-on platform for cybersecurity training. hackthebox.com
TryHackMe Accessible CTF and training labs for all levels. tryhackme.com
PicoCTF Beginner-friendly CTF platform for students. picoctf.com
SANS Cyber Aces Free training in foundational cybersecurity concepts. cyberaces.org
Codecademy Online coding and security fundamentals courses. codecademy.com

17. Obfuscators & Evasion Tools

These tools are geared toward obfuscation, evasion, and payload manipulation, making them ideal for red team operations. They allow you to craft undetectable payloads, evade antivirus (AV) detection, and cloak activities to bypass security measures.

Tool Description Link
Veil Evasion framework for generating undetectable payloads. veil-framework.com
Shellter Dynamic shellcode injection tool for Windows, used to evade AV. shellterproject.com
Hyperion Binary obfuscator to bypass AV detection. GitHub
Obfuscator.io JavaScript and Node.js obfuscator for web applications. obfuscator.io
ConfuserEx .NET obfuscator widely used for software protection. GitHub
PEzor Shellcode and PE file obfuscation tool for AV evasion. GitHub
Exeinfo PE Packed executable identifier; detects PE file packers and crypters. exeinfo.com
DNGuard HVM Professional .NET code protection with dynamic virtualization. dnguard.net
obfuscar Basic .NET obfuscator to protect managed code. GitHub
NetCrypt Tool for encrypting and obfuscating .NET binaries. GitHub
Dynamic Camo Framework for obfuscating C2 traffic using various network camouflage techniques. GitHub

18. Advanced Red Team Tools

These tools are essential for red team operators who need to execute, maintain, and manage advanced attacks, often leveraging techniques for persistence, lateral movement, and stealth across target environments.

Tool Description Link
Covenant .NET-based C2 framework with encrypted communication for post-exploitation. GitHub
Sliver Open-source C2 framework supporting various payloads for adversary emulation. GitHub
PoshC2 PowerShell-based C2 framework with extensive post-exploitation tools. GitHub
Merlin C2 tool for managing multiple clients across different platforms with HTTPS-based communication. GitHub
Rubeus Tool for Kerberos abuse, allowing credential extraction and golden ticket attacks. GitHub
SharpHound Data collector for BloodHound, used to map out AD relationships and find attack paths. GitHub
Impacket Collection of Python classes for SMB, Kerberos, and other protocols used in network attacks. GitHub
PowerSploit Post-exploitation framework for PowerShell-based attack techniques. GitHub
DeathStar Automates Active Directory attacks using Empire and BloodHound. GitHub
Seatbelt Post-exploitation tool that collects security-relevant information on Windows systems. GitHub
FruityC2 C2 framework focused on web-based operations and automation. GitHub
Koadic JScript RAT for Windows; similar to Meterpreter but for JavaScript. GitHub
SharpLocker Payload that creates a fake lock screen on Windows to capture credentials. GitHub
GhostPack Collection of tools for offensive security operations, including credential and token abuse. GitHub
Evil-WinRM PowerShell-based WinRM shell for accessing Windows machines remotely. GitHub
CredNinja Tool for discovering and managing credentials across Active Directory environments. GitHub

19. Specialized Red Team Creation Tools

For red team operators crafting complex, customized attacks and bypasses, these tools allow for advanced payload development, exploit creation, and extensive evasion capabilities.

Tool Description Link
Mythic Open-source C2 framework that supports custom agents and payload flexibility. GitHub
Obsidian C2 Modular C2 framework designed for stealth and payload customization. GitHub
SharpSploit Post-exploitation library for .NET with credential extraction and token manipulation. GitHub
Metta Adversary simulation tool that uses scripts to emulate attacker behavior. GitHub
ScareCrow Payload generation framework that focuses on evading Windows Defender and AMSI. GitHub
Invoke-DOSfuscation DOS command obfuscation techniques to evade command-line detection. GitHub
Koadic JScript-based RAT for advanced post-exploitation on Windows. GitHub
Octopus C2 Cross-platform C2 with support for modular agent and payload creation. GitHub
FUD-Crypter Framework for creating fully undetectable payloads to bypass AV detection. GitHub
RedELK Red team tracking and logging solution, designed for monitoring attacks. GitHub
Demiguise Tool for obfuscating AMSI bypasses on Windows, used in red team engagements. GitHub
Unicorn PowerShell tool for obfuscating shellcode and delivering payloads through injection. GitHub
Caldera Automated adversary emulation platform by MITRE for scalable attack testing. GitHub
Ebowla Tool for generating encrypted payloads and adding obfuscation for stealth. GitHub

20 Extra CTF Tools

These additional tools and resources support niche CTF challenges across cryptography, reverse engineering, web exploitation, and binary analysis, giving you an edge in tackling specific categories.

Tool Description Link
Qiling Emulation framework for binary analysis across multiple architectures. GitHub
OneGadget Finds usable RCE (remote code execution) gadgets in binaries for one-shot exploits. GitHub
GEF (GDB Enhanced Features) Enhanced GDB features for debugging and exploit development. GitHub
pwndbg GDB plugin tailored for exploit development and debugging binaries in CTFs. GitHub
Apktool Tool for decompiling and analyzing Android APK files, commonly used in mobile CTFs. GitHub
Hash Extender Command-line tool for performing length extension attacks on hashes. GitHub
Z3 Theorem prover often used for symbolic execution in reverse engineering challenges. GitHub
Binary Ninja Free Reverse engineering platform (free edition) with powerful binary analysis tools. binary.ninja
Insomni'hack payloads Payload collection tailored for various CTF challenges and penetration testing. GitHub
NCLab Training platform offering hands-on labs and virtual machines for CTF practice. nclab.com
SecLists Compilation of attack payloads, wordlists, and fuzzing lists, commonly used in web and network challenges. GitHub
Forensics Wiki Resource wiki for digital forensics techniques, tools, and CTF challenges. forensicswiki.org
StegSolve Java-based tool for stegano analysis, particularly with LSB modifications in images. GitHub
CertGraph SSL certificate visualization tool, useful in OSINT and network mapping challenges. GitHub
Cryptool Interactive cryptography learning tool for understanding and analyzing cryptographic techniques. cryptool.org

Contributions

If you’d like to contribute, feel free to fork this repository and add any tools or resources that enhance the guide. Contributions to specific examples or additional resources will help this collection grow and stay up-to-date with the latest in cybersecurity.

Thank you for exploring the Cybersecurity and CTF Resource Guide. Together, we’re building a one-stop resource for digital security mastery.

Happy hacking! 👾