SlideShare a Scribd company logo
1 of 7
Download to read offline
Listing Tools For CTF
Reverse Engineering:
GDB -
http://www.gnu.org/software/gdb/download/
IDA Pro - https://www.hex-
rays.com/products/ida/support/download.shtml
Immunity Debugger -
http://debugger.immunityinc.com/
OllyDbg - http://www.ollydbg.de/
radare2 - http://www.radare.org/y/?p=download
Hopper -
http://www.hopperapp.com/download.html
nm - unix/linux tool
objdump - linux tool
Networking
Networking:
Wireshark, tshark -
https://www.wireshark.org/download.html
OpenVPN - https://openvpn.net/
OpenSSL -
https://www.openssl.org/related/binaries.html
tcpdump - http://www.tcpdump.org/
netcat - http://netcat.sourceforge.net/
nmap - http://nmap.org/download.html
Steganography
Steganography:
OpenStego - http://www.openstego.info/
OutGuess -
http://www.outguess.org/download.php
SilentEye -
http://www.silenteye.org/download.html
Steghide -
http://steghide.sourceforge.net/download.php
StegFS - http://sourceforge.net/projects/stegfs/
pngcheck -
http://www.libpng.org/pub/png/apps/pngcheck.html
Forensics
Forensics:
dd - unix/linux tool
strings - unix/linux tool
scalpel - https://github.com/sleuthkit/scalpel
TrID - http://mark0.net/soft-trid-e.html
Digital Image Forensic -
http://www.imageforensic.org/
binwalk - http://binwalk.org/
foremost - http://foremost.sourceforge.net/
ExifTool -
http://www.sno.phy.queensu.ca/~phil/exiftool/
Digital Forensics Framework (DFF) -
Scripting / PPC (Professional
Programming and Coding):
Text editors:
Sublime Text - http://www.sublimetext.com/
Notepad++ - http://notepad-plus-plus.org/
vim - http://www.vim.org/
emacs - http://www.gnu.org/software/emacs/
Crypto
Cryptool - https://www.cryptool.org/
hashpump - https://github.com/bwall/HashPump
Sage - http://www.sagemath.org/
John the Ripper - http://www.openwall.com/john/
xortool - https://github.com/hellman/xortool
Online tools:
http://www.crypo.com/
http://www.cryptool-online.org/
http://rumkin.com/tools/cipher/
Modules for python - pycrypto -
https://www.dlitz.net/software/pycrypto/

More Related Content

Similar to DepokCyberSecurity - ServerHack - Wisolusindo -

Pentesting111111 Cheat Sheet_OSCP_2023.pdf
Pentesting111111 Cheat Sheet_OSCP_2023.pdfPentesting111111 Cheat Sheet_OSCP_2023.pdf
Pentesting111111 Cheat Sheet_OSCP_2023.pdf
faker1842002
 

Similar to DepokCyberSecurity - ServerHack - Wisolusindo - (20)

Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
 
Sandbox kiev
Sandbox kievSandbox kiev
Sandbox kiev
 
Pentest iot - SDR
Pentest iot - SDRPentest iot - SDR
Pentest iot - SDR
 
Pentesting111111 Cheat Sheet_OSCP_2023.pdf
Pentesting111111 Cheat Sheet_OSCP_2023.pdfPentesting111111 Cheat Sheet_OSCP_2023.pdf
Pentesting111111 Cheat Sheet_OSCP_2023.pdf
 
Mobile malware heuristics the path from 'eh' to pretty good'
Mobile malware heuristics  the path from 'eh' to pretty good'Mobile malware heuristics  the path from 'eh' to pretty good'
Mobile malware heuristics the path from 'eh' to pretty good'
 
Android 5.0 Lollipop platform change investigation report
Android 5.0 Lollipop platform change investigation reportAndroid 5.0 Lollipop platform change investigation report
Android 5.0 Lollipop platform change investigation report
 
The Green Lab - [04 B] [PWA] Experiment setup
The Green Lab - [04 B] [PWA] Experiment setupThe Green Lab - [04 B] [PWA] Experiment setup
The Green Lab - [04 B] [PWA] Experiment setup
 
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
 
Android tools for testers
Android tools for testersAndroid tools for testers
Android tools for testers
 
Software Livre - Parte 2
Software Livre - Parte 2Software Livre - Parte 2
Software Livre - Parte 2
 
Cần gì đồ chùa khi chúng ta có những thứ tuyệt vời thế này
Cần gì đồ chùa khi chúng ta có những thứ tuyệt vời thế nàyCần gì đồ chùa khi chúng ta có những thứ tuyệt vời thế này
Cần gì đồ chùa khi chúng ta có những thứ tuyệt vời thế này
 
Testing CAN network with help of CANToolz
Testing CAN network with help of CANToolzTesting CAN network with help of CANToolz
Testing CAN network with help of CANToolz
 
redGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solutionredGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solution
 
0507 057 01 98 * Adana Klima Servisleri
0507 057 01 98 * Adana Klima Servisleri0507 057 01 98 * Adana Klima Servisleri
0507 057 01 98 * Adana Klima Servisleri
 
Shall we play a game
Shall we play a gameShall we play a game
Shall we play a game
 
Shall we play a game?
Shall we play a game?Shall we play a game?
Shall we play a game?
 
Parrot Drones Hijacking
Parrot Drones HijackingParrot Drones Hijacking
Parrot Drones Hijacking
 
Software Livre - Parte I
Software Livre - Parte ISoftware Livre - Parte I
Software Livre - Parte I
 
Pwning mobile apps without root or jailbreak
Pwning mobile apps without root or jailbreakPwning mobile apps without root or jailbreak
Pwning mobile apps without root or jailbreak
 
Trying and evaluating the new features of GlusterFS 3.5
Trying and evaluating the new features of GlusterFS 3.5Trying and evaluating the new features of GlusterFS 3.5
Trying and evaluating the new features of GlusterFS 3.5
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

DepokCyberSecurity - ServerHack - Wisolusindo -

  • 2. Reverse Engineering: GDB - http://www.gnu.org/software/gdb/download/ IDA Pro - https://www.hex- rays.com/products/ida/support/download.shtml Immunity Debugger - http://debugger.immunityinc.com/ OllyDbg - http://www.ollydbg.de/ radare2 - http://www.radare.org/y/?p=download Hopper - http://www.hopperapp.com/download.html nm - unix/linux tool objdump - linux tool
  • 3. Networking Networking: Wireshark, tshark - https://www.wireshark.org/download.html OpenVPN - https://openvpn.net/ OpenSSL - https://www.openssl.org/related/binaries.html tcpdump - http://www.tcpdump.org/ netcat - http://netcat.sourceforge.net/ nmap - http://nmap.org/download.html
  • 4. Steganography Steganography: OpenStego - http://www.openstego.info/ OutGuess - http://www.outguess.org/download.php SilentEye - http://www.silenteye.org/download.html Steghide - http://steghide.sourceforge.net/download.php StegFS - http://sourceforge.net/projects/stegfs/ pngcheck - http://www.libpng.org/pub/png/apps/pngcheck.html
  • 5. Forensics Forensics: dd - unix/linux tool strings - unix/linux tool scalpel - https://github.com/sleuthkit/scalpel TrID - http://mark0.net/soft-trid-e.html Digital Image Forensic - http://www.imageforensic.org/ binwalk - http://binwalk.org/ foremost - http://foremost.sourceforge.net/ ExifTool - http://www.sno.phy.queensu.ca/~phil/exiftool/ Digital Forensics Framework (DFF) -
  • 6. Scripting / PPC (Professional Programming and Coding): Text editors: Sublime Text - http://www.sublimetext.com/ Notepad++ - http://notepad-plus-plus.org/ vim - http://www.vim.org/ emacs - http://www.gnu.org/software/emacs/
  • 7. Crypto Cryptool - https://www.cryptool.org/ hashpump - https://github.com/bwall/HashPump Sage - http://www.sagemath.org/ John the Ripper - http://www.openwall.com/john/ xortool - https://github.com/hellman/xortool Online tools: http://www.crypo.com/ http://www.cryptool-online.org/ http://rumkin.com/tools/cipher/ Modules for python - pycrypto - https://www.dlitz.net/software/pycrypto/