A comprehensive collection of developer tools, CTF resources, and handy scripts for cybersecurity professionals and developers.
| Category | Link | Description |
|---|---|---|
| 🔧 Installation Errors | InstallationErrors/ | Common installation issues and solutions |
| 📜 Useful Scripts | UsefulScripts/ | Handy automation scripts and utilities |
| 🌐 CTF Web | CTF/web/ | Web application security challenges |
| 🔐 CTF Crypto | CTF/crypto/ | Cryptographic challenges and solutions |
| 🔍 CTF Forensics | CTF/forensics/ | Digital forensics and file analysis |
| 🕵️ CTF OSINT | CTF/osint/ | Open source intelligence gathering |
| 🖼️ CTF Steganography | CTF/stego/ | Hidden data extraction techniques |
| 💥 CTF PWN | CTF/pwn/ | Binary exploitation and reverse engineering |
| 🎯 CTF Misc | CTF/misc/ | Miscellaneous challenges and tools |
- Git
- Python 3.x (for Python scripts)
- Bash (for shell scripts)
-
Clone the repository:
git clone https://github.com/echobash/CTF-Toolkit.git cd CTF-Toolkit -
Explore the categories:
- Browse through the different categories based on your needs
- Each category contains specific tools and resources
- Check individual README files in each category for detailed instructions
-
For Python scripts:
pip3 install -r requirements.txt # if requirements.txt exists -
For shell scripts:
chmod +x *.sh # make scripts executable
We welcome contributions! Help us expand this toolkit by adding more CTF tools, resources, and solutions.
- Fork this repository
- Add new CTF tools, links, or resources
- Create a pull request
- Get recognized as a contributor! 🏆
- Add new CTF tool links
- Improve existing documentation
- Add new categories or sections
- Fix broken links
- Enhance tool descriptions
Thank you to all contributors who help make this project better! 🎉
Notable Contributors:
- @VedantAnand17 - Documentation improvements and repository structure enhancements
If this toolkit helps you in CTF competitions or development, please consider giving it a star! It helps others discover these valuable resources.
Made with ❤️ by echobash
Empowering the cybersecurity community with practical tools and resources