Skip to content

QIO1984/CTF_Resources

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

5 Commits
Β 
Β 

Repository files navigation

MADNOTE HACKS

MADNOTE HACKS

A Collection of Links to Tools, Resources, and Guides for Cybersecurity, Hacking, and CTF Events

Contributions Welcomed!


Note: The headings in part 1 of this guide align with domains of the National Cyber League's CTF competition. Additionally, I acknowledge that there are many excellent paid tools and resources in the categories below. This list is intended to provide FOSS resources related to cybersecurity and ethical hacking, so for the most part, paid tools have been excluded.


πŸ” Open Source Intelligence (OSINT)

πŸ—‚οΈ Meta-Resources

  • OSINT Framework
    An interactive chart linking various OSINT tools and resources.

  • Ohshint Blog
    A comprehensive OSINT blog covering tools and techniques.

  • OSINT4ALL
    A categorized collection of OSINT tools, search engines, and databases.

  • Cipher387 on GitHub
    A well-curated collection of OSINT tools and resources.

πŸ•΅οΈ Websites, Applications, and CLI Tools

πŸ“ FTP Search Tools

🌐 DNS & Network Reconnaissance Tools

  • Netcraft Recon Tools
    Suite of tools for website reconnaissance and threat analysis.

  • Netcraft Website Recon
    Provides detailed information on website hosting and infrastructure.

  • DNSDumpster
    DNS research tool for discovering hosts and subdomains.

  • Domain Tools Whois Lookup
    A tool for looking up domain information, including ownership and registration details.

  • Pentest-Tools
    Collection of tools for website reconnaissance.

  • MXToolbox
    Tools for domain lookup and reverse DNS checking.

  • SecurityTrails
    Advanced DNS enumeration tool with network mapping capabilities.

  • Fierce
    A CLI tool for DNS reconnaissance and subdomain discovery.

  • DNSRecon
    CLI tool for reverse DNS lookups and comprehensive DNS enumeration.

πŸ‘₯ People & Social Media Tools

  • Spokeo
    People search engine aggregating publicly available data.

  • The Harvester
    CLI tool to gather emails, subdomains, and hostnames from public sources.

  • Sherlock
    CLI tool to search for usernames across multiple social networks.

  • Social Searcher
    Track a target user across various social media platforms.

πŸ“‘ IoT & SCADA Search Engines

  • Shodan
    Searches for internet-connected devices and IoT endpoints.

  • Censys
    Indexes devices and networks for cybersecurity research.

  • ZoomEye
    A search engine for discovering IoT and SCADA devices.

πŸ“Š Traceroute & Network Analysis Tools

  • NetScanTools
    A suite of network diagnostic tools including traceroute.

  • PingPlotter
    Graphical traceroute and network performance monitoring tool.

  • EmailTrackerPro
    Extracts email header information to trace email origins.

πŸ”Ž General Recon & Miscellaneous Tools

  • Maltego
    Automated tool to map relationships between people, organizations, and digital infrastructure.

  • Recon Dog
    An all-in-one tool for basic information gathering using APIs.

  • Kloth NSLookup
    Online utility for performing DNS lookups.

  • EXIF Tool
    Online tool for extracting photo metadata (EXIF data).

  • Reverse Shell Generator
    Docker-based web tool for generating reverse shell payloads.

  • Online Barcode Reader
    A tool to scan and decode barcodes from images or webcam input.

πŸ›‘ Online Malware Analysis

  • Hybrid Analysis
    Online malware analysis sandbox for dynamic file analysis.

  • Any.Run
    Interactive malware analysis platform for real-time investigation.

  • Valkyrie Sandbox
    Cloud-based sandbox for analyzing suspicious files.

  • Joe Sandbox Cloud
    Advanced malware behavior analysis with automated tools.

  • Jotti
    Free malware scanning using multiple antivirus engines.

πŸ“š Additional Resources

  • Nmap Cheat Sheet
    Handy reference guide for effective Nmap usage.

  • Temp Mail
    Disposable email service for temporary anonymity.

πŸŽ“ OSINT Education


πŸ” Cryptography

πŸ”‘ Tools

  • dCode.fr
    A huge collection of cryptography tools, including a cipher identifier.

  • Cryptography Toolbox
    A collection of cryptographic tools for performing various cryptographic functions like hashing and encryption.

  • DevGlan Cryptography
    Online tools for encryption, decryption, and key generation.

  • Hashes.com - Hash Identifier
    A tool for identifying hash algorithms used for hashing passwords or files.

  • TunnelsUp - Hash Analyzer
    Another online tool to analyze and identify hash values and their algorithms.

  • Openpgp.org
    A public keyserver for managing and searching OpenPGP keys, useful for email encryption.

  • Ubuntu Public Keyserver
    A keyserver maintained by Ubuntu for managing PGP keys, often used in open-source software distributions.

  • AperiSolve
    A tool to decode hidden information within image files using steganography techniques.

πŸŽ“ Cryptography Education

  • CryptoTool Online
    A hands-on cryptography simulator with interactive lessons.

  • Cipher Machines
    A resource for learning about historical cipher machines, encryption methods, and cryptographic history.


πŸ”“ Password Cracking

πŸ”¨ Tools

  • SecLists GitHub
    A comprehensive collection of password lists and other wordlists used in security testing and cracking.

  • Crackstation
    An online hash-cracking tool using massive rainbow tables.

  • Hashcat Example Table
    A reference for identifying hash types.

  • HashID
    A Linux command-line tool for identifying hash types.

  • Ophcrack SourceForge
    A project providing rainbow tables for cracking NTLM hashes used for password recovery.


πŸ•΅οΈβ€β™‚οΈ Forensics

πŸ›  Tools

  • Autopsy
    A digital forensics tool for disk and file system analysis.

  • Volatility
    A powerful memory forensics framework used in incident response.

  • Metadata2Go - View File Metadata
    A tool for viewing metadata embedded in files, such as EXIF data in images or document properties.

  • List of File Signatures - Wikipedia
    A detailed list of file signatures used in forensics to identify file types through magic bytes.

  • Hexed.it
    A free online tool for performing hexdumps and editing binary files, often used for file analysis and forensics.

πŸŽ“ Forensics Education

  • DFIR Training
    A training hub for digital forensics and incident response.

  • Epoch Converter
    A tool for converting Unix timestamps (epoch times), useful for analyzing file metadata and system logs.


πŸ“œ Log Analysis

(Section to be filled)


πŸ“‘ Network Traffic Analysis

(Section to be filled)


πŸ”Ž Scanning and Recon

(Section to be filled)


🌍 Web Application Exploitation

πŸ”’ Tools

  • Burp Suite
    A leading web vulnerability scanner and penetration testing tool.

  • SiriHash
    Validates security hashes for online libraries like jQuery.

  • Pentest Tools
    A suite of web application penetration testing tools for security audits, vulnerability scanning, and exploitation.

πŸŽ“ Web App Security Education

  • OWASP Top 10
    A crucial guide to web application vulnerabilities.

πŸ“Ά Wireless Access Exploitation

(Section to be filled)


πŸ’₯ Enumeration and Exploitation

(Section to be filled)


πŸ›‘ Security-Focused Operating Systems

  • πŸ‰ Kali Linux
    A powerful Linux distro for penetration testing and ethical hacking.

  • 🦜 ParrotOS
    A privacy-focused OS for penetration testing and forensic analysis.

  • πŸ–₯ BlackArch
    A customizable Arch Linux-based security OS with thousands of tools.


🎢 MADNOTE'S PLAYLIST

🎧 A collection of atmospheric, minimal-lyric music to enhance focus and hacking vibes.

Chillstep/Future Garage Mix for Deep Programming and Work - Chill Music Lab D E B R I S - a Spacewave Mix - by I N E X E D
Chillstep & Future Garage Mix β€” Music for Deep Programming and Work - Chill Music Lab D E B R I S - a Spacewave Mix - by I N E X E D
N E T R U N vol 1 - a Retrowave/Synthwave Mix - by I N E X E D G R O O V E - a Chillwave/Retrowave Mix - by I N E X E D
N E T R U N vol 1 - a Retrowave/Synthwave Mix - by I N E X E D G R O O V E - a Chillwave/Retrowave Mix - by I N E X E D

About

A list of CTF, hacking, and Cybersecurity tools and resources aimed at students and CTF competitors, with emphasis on non-paid tools.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors