Commit 413bea36 authored by noraj's avatar noraj

dyn template + new exploit

- add bludit exploit
- more dynamic template for tools
parent 928b79f0
Pipeline #178446775 passed with stage
in 1 minute and 59 seconds
{
"challenges": [
{
"title": "Men in black box",
"description": "A web challenge that was available during SigSegV1 CTF (2018). It was a Boolean-based Blind SQLi with WAF.",
"source": "https://github.com/noraj/SigSegV1.webserver_7"
},
{
"title": "Sensory Domination Droid",
"description": "A programming challenge that was available during SigSegV1 CTF (2018). It was an IRC bot, the goal was to parse private IRC messages.",
"source": "https://github.com/noraj/SigSegV1.prog_2"
},
{
"title": "Fat",
"description": "A web challenge that was available during SigSegV2 CTF (2019). It was a Slim SSTI combined with a Sinatra/Rack session cookie forgery.",
"source": "https://github.com/noraj/SigSegV2.webserver_4"
},
{
"title": "Image Checker 1",
"description": "A web challenge that was available during SigSegV2 CTF (2019). It was a XXE OOB via SVG rasterization and a local file read.",
"source": "https://github.com/noraj/SigSegV2.webserver_3"
},
{
"title": "Image Checker 2",
"description": "A web challenge that was available during SigSegV2 CTF (2019). It was a XXE OOB via SVG combined with a SSRF port scan and a SSRF localhost bypass.",
"source": "https://github.com/noraj/SigSegV2.webserver_11"
},
{
"title": "10 questions about my system",
"description": "A forensics challenge that was available during SigSegV2 CTF (2019). It was a Volatility profile creation and 10 basic questions on the memory dump.",
"source": "https://github.com/noraj/SigSegV2.forensics_2"
},
{
"title": "Une porte peut en cacher une autre",
"description": "A web challenge that was available during SigSegV2 CTF (2019). It was a b374k.php webshell with c99 style PHP backdoor authentication bypass.",
"source": "https://github.com/noraj/SigSegV2.webserver_5"
},
{
"title": "noraj secret zone",
"description": "A web/misc/reverse/network challenge that was available during SigSegV2 CTF (2019). It was an eepsite (I2P website) containing obfuscated JavaScript.",
"source": "https://github.com/noraj/SigSegV2.misc_5"
},
{
"title": "The long way",
"description": "A misc challenge that was available during SigSegV2 CTF (2019). It was a extra long file path on exFAT FS, scripting was mandatory to retrieve the whole path.",
"source": "https://github.com/noraj/SigSegV2.misc_4"
},
{
"title": "Drugs: crack & hash",
"description": "A cracking challenge that was available during SigSegV2 CTF (2019). Password hash cracking with custom dictionary/wordlist. There were 10 hashes to crack.",
"source": "https://github.com/noraj/SigSegV2.cracking_1"
},
{
"title": "Matz 2.3",
"description": "A reverse challenge that was available during SigSegV2 CTF (2019). Ruby bytecode reverse engineering/disassembly making use of RubyVM class.",
"source": "https://github.com/noraj/SigSegV2.reverse_6"
}
]
}
{
"title": "ctf-party",
"description": "A library to enhance and speed up script/exploit writing for CTF players (or security researchers, bug bounty hunters, pentesters but mostly focused on CTF) by patching the String class to add a short syntax of usual code patterns.",
"website": "https://noraj.github.io/ctf-party/",
"source": "https://github.com/noraj/ctf-party"
}
{
"title": "AtMail Exploit toolchain",
"description": "AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)",
"source": "https://github.com/noraj/Atmail-exploit-toolchain"
}
{
"title": "OpenEMR RCE",
"description": "OpenEMR <= 5.0.1 - (Authenticated) Remote Code Execution",
"source": "https://github.com/noraj/OpenEMR-RCE"
}
{
"title": "Umbraco RCE",
"description": "Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution",
"source": "https://github.com/noraj/Umbraco-RCE"
}
{
"exploits": [
{
"title": "Umbraco RCE",
"description": "Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution",
"source": "https://github.com/noraj/Umbraco-RCE"
},
{
"title": "AtMail Exploit toolchain",
"description": "AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)",
"source": "https://github.com/noraj/Atmail-exploit-toolchain"
},
{
"title": "OpenEMR RCE",
"description": "OpenEMR <= 5.0.1 - (Authenticated) Remote Code Execution",
"source": "https://github.com/noraj/OpenEMR-RCE"
},
{
"title": "Bludit Auth BF mitigation bypass",
"description": "Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass",
"source": "https://github.com/noraj/Bludit-auth-BF-bypass"
}
]
}
{
"title": "Flask Session Cookie Decoder/Encoder",
"description": "A simple python script that let you encode and decode a Flask session cookie.",
"website": "https://noraj.github.io/flask-session-cookie-manager",
"source": "https://github.com/noraj/flask-session-cookie-manager"
}
{
"title": "HAITI",
"description": "A CLI tool to identify the hash type of a given hash.",
"website": "https://noraj.github.io/haiti/",
"source": "https://github.com/noraj/haiti"
}
{
"title": "itdis",
"description": "Is a small tool that allows you to check if a list of domains you have been provided is in the scope of your pentest or not.",
"website": "https://noraj.gitlab.io/itdis/",
"source": "https://gitlab.com/noraj/itdis"
}
{
"title": "nvd_feed_api",
"description": "A simple ruby API/library for managing NVD CVE feeds. The API will help you to download and manage NVD Data Feeds, search for CVEs, build your vulnerability assessment platform or vulnerability database.",
"website": "https://noraj.gitlab.io/nvd_api/",
"source": "https://gitlab.com/noraj/nvd_api"
}
{
"title": "OSCP Exam Report Template in Markdown",
"description": "Markdown Templates for OSCP Exam Report.",
"website": "https://noraj.github.io/OSCP-Exam-Report-Template-Markdown",
"source": "https://github.com/noraj/OSCP-Exam-Report-Template-Markdown"
}
{
"title": "PixelChart",
"description": "Map binary data into a beautiful chart.",
"website": "https://pixelchart.cf/",
"source": "https://github.com/noraj/PixelChart"
}
{
"projects": [
{
"title": "Offensive Security Exam Report Template in Markdown",
"description": "Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report.",
"website": "https://noraj.github.io/OSCP-Exam-Report-Template-Markdown",
"source": "https://github.com/noraj/OSCP-Exam-Report-Template-Markdown"
},
{
"title": "XSS classification model",
"description": "XSS classification model - Types of Cross-Site Scripting",
"website": "https://noraj.github.io/XSS-classification-model/",
"source": "https://github.com/noraj/XSS-classification-model/"
}
]
}
{
"title": "RABID",
"description": "A CLI tool and library allowing to simply decode all kind of BigIP cookies.",
"website": "https://noraj.github.io/rabid/",
"source": "https://github.com/noraj/rabid"
}
{
"title": "Sensory Domination Droid",
"description": "A programming challenge that was available during SigSegV1 CTF (2018). It was an IRC bot, the goal was to parse private IRC messages.",
"source": "https://github.com/noraj/SigSegV1.prog_2"
}
{
"title": "Men in black box",
"description": "A web challenge that was available during SigSegV1 CTF (2018). It was a Boolean-based Blind SQLi with WAF.",
"source": "https://github.com/noraj/SigSegV1.webserver_7"
}
{
"title": "Drugs: crack & hash",
"description": "A cracking challenge that was available during SigSegV2 CTF (2019). Password hash cracking with custom dictionary/wordlist. There were 10 hashes to crack.",
"source": "https://github.com/noraj/SigSegV2.cracking_1"
}
{
"title": "10 questions about my system",
"description": "A forensics challenge that was available during SigSegV2 CTF (2019). It was a Volatility profile creation and 10 basic questions on the memory dump.",
"source": "https://github.com/noraj/SigSegV2.forensics_2"
}
{
"title": "The long way",
"description": "A misc challenge that was available during SigSegV2 CTF (2019). It was a extra long file path on exFAT FS, scripting was mandatory to retrieve the whole path.",
"source": "https://github.com/noraj/SigSegV2.misc_4"
}
{
"title": "noraj secret zone",
"description": "A web/misc/reverse/network challenge that was available during SigSegV2 CTF (2019). It was an eepsite (I2P website) containing obfuscated JavaScript.",
"source": "https://github.com/noraj/SigSegV2.misc_5"
}
{
"title": "Matz 2.3",
"description": "A reverse challenge that was available during SigSegV2 CTF (2019). Ruby bytecode reverse engineering/disassembly making use of RubyVM class.",
"source": "https://github.com/noraj/SigSegV2.reverse_6"
}
{
"title": "Image Checker 2",
"description": "A web challenge that was available during SigSegV2 CTF (2019). It was a XXE OOB via SVG combined with a SSRF port scan and a SSRF localhost bypass.",
"source": "https://github.com/noraj/SigSegV2.webserver_11"
}
{
"title": "Image Checker 1",
"description": "A web challenge that was available during SigSegV2 CTF (2019). It was a XXE OOB via SVG rasterization and a local file read.",
"source": "https://github.com/noraj/SigSegV2.webserver_3"
}
{
"title": "Fat",
"description": "A web challenge that was available during SigSegV2 CTF (2019). It was a Slim SSTI combined with a Sinatra/Rack session cookie forgery.",
"source": "https://github.com/noraj/SigSegV2.webserver_4"
}
{
"title": "Une porte peut en cacher une autre",
"description": "A web challenge that was available during SigSegV2 CTF (2019). It was a b374k.php webshell with c99 style PHP backdoor authentication bypass.",
"source": "https://github.com/noraj/SigSegV2.webserver_5"
}
{
"tools": [
{
"title": "nvd_feed_api",
"description": "A simple ruby API/library for managing NVD CVE feeds. The API will help you to download and manage NVD Data Feeds, search for CVEs, build your vulnerability assessment platform or vulnerability database.",
"website": "https://noraj.gitlab.io/nvd_api/",
"source": "https://gitlab.com/noraj/nvd_api"
},
{
"title": "Flask Session Cookie Decoder/Encoder",
"description": "A simple python script that let you encode and decode a Flask session cookie.",
"website": "https://noraj.github.io/flask-session-cookie-manager",
"source": "https://github.com/noraj/flask-session-cookie-manager"
},
{
"title": "RABID",
"description": "A CLI tool and library allowing to simply decode all kind of BigIP cookies.",
"website": "https://noraj.github.io/rabid/",
"source": "https://github.com/noraj/rabid"
},
{
"title": "HAITI",
"description": "A CLI tool to identify the hash type of a given hash.",
"website": "https://noraj.github.io/haiti/",
"source": "https://github.com/noraj/haiti"
},
{
"title": "ctf-party",
"description": "A library to enhance and speed up script/exploit writing for CTF players (or security researchers, bug bounty hunters, pentesters but mostly focused on CTF) by patching the String class to add a short syntax of usual code patterns.",
"website": "https://noraj.github.io/ctf-party/",
"source": "https://github.com/noraj/ctf-party"
},
{
"title": "itdis",
"description": "Is a small tool that allows you to check if a list of domains you have been provided is in the scope of your pentest or not.",
"website": "https://noraj.gitlab.io/itdis/",
"source": "https://gitlab.com/noraj/itdis"
},
{
"title": "PixelChart",
"description": "Map binary data into a beautiful chart.",
"website": "https://pixelchart.cf/",
"source": "https://github.com/noraj/PixelChart"
},
{
"title": "VBSmin",
"description": "VBScript minifier CLI tool and library",
"website": "https://noraj.github.io/vbsmin/",
"source": "https://github.com/noraj/vbsmin"
}
]
}
{
"title": "VBSmin",
"description": "VBScript minifier CLI tool and library",
"website": "https://noraj.github.io/vbsmin/",
"source": "https://github.com/noraj/vbsmin"
}
{
"title": "XSS classification model",
"description": "XSS classification model - Types of Cross-Site Scripting",
"website": "https://noraj.github.io/XSS-classification-model/",
"source": "https://github.com/noraj/XSS-classification-model/"
}
......@@ -5,289 +5,66 @@ title: Tools
h1.title.is-1.has-text-centered#tools Tools
.columns.is-multiline
.column.is-one-quarter
.card
header.card-header
p.card-header-title = data.tools.nvd_feed_api.title
a.card-header-icon href="#"
span.icon
i.fas.fa-tools aria-hidden="true"
.card-content
.content = data.tools.nvd_feed_api.description
footer.card-footer
a.card-footer-item href=data.tools.nvd_feed_api.website target='_blank' rel='noopener noreferrer' Website
a.card-footer-item href=data.tools.nvd_feed_api.source target='_blank' rel='noopener noreferrer' Source
.column.is-one-quarter
.card
header.card-header
p.card-header-title = data.tools.flask_session_cookie_manager.title
a.card-header-icon href="#"
span.icon
i.fas.fa-tools aria-hidden="true"
.card-content
.content = data.tools.flask_session_cookie_manager.description
footer.card-footer
a.card-footer-item href=data.tools.flask_session_cookie_manager.website target='_blank' rel='noopener noreferrer' Website
a.card-footer-item href=data.tools.flask_session_cookie_manager.source target='_blank' rel='noopener noreferrer' Source
.column.is-one-quarter
.card
header.card-header
p.card-header-title = data.tools.rabid.title
a.card-header-icon href="#"
span.icon
i.fas.fa-tools aria-hidden="true"
.card-content
.content = data.tools.rabid.description
footer.card-footer
a.card-footer-item href=data.tools.rabid.website target='_blank' rel='noopener noreferrer' Website
a.card-footer-item href=data.tools.rabid.source target='_blank' rel='noopener noreferrer' Source
.column.is-one-quarter
.card
header.card-header
p.card-header-title = data.tools.haiti.title
a.card-header-icon href="#"
span.icon
i.fas.fa-tools aria-hidden="true"
.card-content
.content = data.tools.haiti.description
footer.card-footer
a.card-footer-item href=data.tools.haiti.website target='_blank' rel='noopener noreferrer' Website
a.card-footer-item href=data.tools.haiti.source target='_blank' rel='noopener noreferrer' Source
.column.is-one-quarter
.card
header.card-header
p.card-header-title = data.tools.ctf_party.title
a.card-header-icon href="#"
span.icon
i.fas.fa-tools aria-hidden="true"
.card-content
.content = data.tools.ctf_party.description
footer.card-footer
a.card-footer-item href=data.tools.ctf_party.website target='_blank' rel='noopener noreferrer' Website
a.card-footer-item href=data.tools.ctf_party.source target='_blank' rel='noopener noreferrer' Source
.column.is-one-quarter
.card
header.card-header
p.card-header-title = data.tools.itdis.title
a.card-header-icon href="#"
span.icon
i.fas.fa-tools aria-hidden="true"
.card-content
.content = data.tools.itdis.description
footer.card-footer
a.card-footer-item href=data.tools.itdis.website target='_blank' rel='noopener noreferrer' Website
a.card-footer-item href=data.tools.itdis.source target='_blank' rel='noopener noreferrer' Source
.column.is-one-quarter
.card
header.card-header
p.card-header-title = data.tools.pixelchart.title
a.card-header-icon href="#"
span.icon
i.fas.fa-tools aria-hidden="true"
.card-content
.content = data.tools.pixelchart.description
footer.card-footer
a.card-footer-item href=data.tools.pixelchart.website target='_blank' rel='noopener noreferrer' Website
a.card-footer-item href=data.tools.pixelchart.source target='_blank' rel='noopener noreferrer' Source
.column.is-one-quarter
.card
header.card-header
p.card-header-title = data.tools.vbsmin.title
a.card-header-icon href="#"
span.icon
i.fas.fa-tools aria-hidden="true"
.card-content
.content = data.tools.vbsmin.description
footer.card-footer
a.card-footer-item href=data.tools.vbsmin.website target='_blank' rel='noopener noreferrer' Website
a.card-footer-item href=data.tools.vbsmin.source target='_blank' rel='noopener noreferrer' Source
- data.tools.tools.tools.each do |tool|
.column.is-one-quarter
.card
header.card-header
p.card-header-title = tool.title
a.card-header-icon href="#"
span.icon
i.fas.fa-tools aria-hidden="true"
.card-content
.content = tool.description
footer.card-footer
a.card-footer-item href=tool.website target='_blank' rel='noopener noreferrer' Website
a.card-footer-item href=tool.source target='_blank' rel='noopener noreferrer' Source
h1.title.is-1.has-text-centered#exploits Exploits
.columns.is-multiline
.column.is-one-quarter
.card
header.card-header
p.card-header-title = data.tools.exploit_umbraco.title
a.card-header-icon href="#"
span.icon
i.fas.fa-tools aria-hidden="true"
.card-content
.content = data.tools.exploit_umbraco.description
footer.card-footer
a.card-footer-item href=data.tools.exploit_umbraco.source target='_blank' rel='noopener noreferrer' Source
.column.is-one-quarter
.card
header.card-header
p.card-header-title = data.tools.exploit_atmail.title
a.card-header-icon href="#"
span.icon
i.fas.fa-tools aria-hidden="true"
.card-content
.content = data.tools.exploit_atmail.description
footer.card-footer
a.card-footer-item href=data.tools.exploit_atmail.source target='_blank' rel='noopener noreferrer' Source
.column.is-one-quarter
.card
header.card-header
p.card-header-title = data.tools.exploit_openemr.title
a.card-header-icon href="#"
span.icon
i.fas.fa-tools aria-hidden="true"
.card-content
.content = data.tools.exploit_openemr.description
footer.card-footer
a.card-footer-item href=data.tools.exploit_openemr.source target='_blank' rel='noopener noreferrer' Source
- data.tools.exploits.exploits.each do |exp|
.column.is-one-quarter
.card
header.card-header
p.card-header-title = exp.title
a.card-header-icon href="#"
span.icon
i.fas.fa-tools aria-hidden="true"
.card-content
.content = exp.description
footer.card-footer
a.card-footer-item href=exp.source target='_blank' rel='noopener noreferrer' Source
h1.title.is-1.has-text-centered#others Other projects
.columns.is-multiline
.column.is-one-quarter
.card
header.card-header
p.card-header-title = data.tools.oscp_exam_report_template_markdown.title
a.card-header-icon href="#"
span.icon
i.fas.fa-tools aria-hidden="true"
.card-content
.content = data.tools.oscp_exam_report_template_markdown.description
footer.card-footer
a.card-footer-item href=data.tools.oscp_exam_report_template_markdown.website target='_blank' rel='noopener noreferrer' Website
a.card-footer-item href=data.tools.oscp_exam_report_template_markdown.source target='_blank' rel='noopener noreferrer' Source
.column.is-one-quarter
.card
header.card-header
p.card-header-title = data.tools.xss_classification_model.title
a.card-header-icon href="#"
span.icon
i.fas.fa-tools aria-hidden="true"
.card-content
.content = data.tools.xss_classification_model.description
footer.card-footer
a.card-footer-item href=data.tools.xss_classification_model.website target='_blank' rel='noopener noreferrer' Website
a.card-footer-item href=data.tools.xss_classification_model.source target='_blank' rel='noopener noreferrer' Source
- data.tools.projects.projects.each do |proj|
.column.is-one-quarter
.card
header.card-header
p.card-header-title = proj.title
a.card-header-icon href="#"
span.icon
i.fas.fa-tools aria-hidden="true"
.card-content
.content = proj.description
footer.card-footer
a.card-footer-item href=proj.website target='_blank' rel='noopener noreferrer' Website
a.card-footer-item href=proj.source target='_blank' rel='noopener noreferrer' Source
h1.title.is-1.has-text-centered#challenges Challenges
.columns.is-multiline
.column.is-one-quarter
.card
header.card-header
p.card-header-title = data.tools.sigsegv1_webserver_7.title
a.card-header-icon href="#"
span.icon
i.fas.fa-tools aria-hidden="true"
.card-content
.content = data.tools.sigsegv1_webserver_7.description
footer.card-footer
a.card-footer-item href=data.tools.sigsegv1_webserver_7.source target='_blank' rel='noopener noreferrer' Source
.column.is-one-quarter
.card
header.card-header
p.card-header-title = data.tools.sigsegv1_prog_2.title
a.card-header-icon href="#"
span.icon
i.fas.fa-tools aria-hidden="true"
.card-content
.content = data.tools.sigsegv1_prog_2.description
footer.card-footer
a.card-footer-item href=data.tools.sigsegv1_prog_2.source target='_blank' rel='noopener noreferrer' Source
.column.is-one-quarter
.card
header.card-header
p.card-header-title = data.tools.sigsegv2_webserver_4.title
a.card-header-icon href="#"
span.icon
i.fas.fa-tools aria-hidden="true"
.card-content
.content = data.tools.sigsegv2_webserver_4.description
footer.card-footer
a.card-footer-item href=data.tools.sigsegv2_webserver_4.source target='_blank' rel='noopener noreferrer' Source
.column.is-one-quarter
.card
header.card-header
p.card-header-title = data.tools.sigsegv2_webserver_3.title
a.card-header-icon href="#"
span.icon
i.fas.fa-tools aria-hidden="true"
.card-content
.content = data.tools.sigsegv2_webserver_3.description
footer.card-footer
a.card-footer-item href=data.tools.sigsegv2_webserver_3.source target='_blank' rel='noopener noreferrer' Source
.column.is-one-quarter
.card
header.card-header
p.card-header-title = data.tools.sigsegv2_webserver_11.title
a.card-header-icon href="#"
span.icon
i.fas.fa-tools aria-hidden="true"
.card-content
.content = data.tools.sigsegv2_webserver_11.description
footer.card-footer
a.card-footer-item href=data.tools.sigsegv2_webserver_11.source target='_blank' rel='noopener noreferrer' Source
.column.is-one-quarter
.card
header.card-header
p.card-header-title = data.tools.sigsegv2_forensics_2.title
a.card-header-icon href="#"
span.icon
i.fas.fa-tools aria-hidden="true"
.card-content
.content = data.