Skip to content
Snippets Groups Projects
Verified Commit 9c1ec844 authored by Daniel Petri's avatar Daniel Petri
Browse files

Add note on CTF tools in general

parent 2d7c7e57
No related branches found
No related tags found
No related merge requests found
# CTF Tools
# CTF Binary Rev/Pwn Tools
This is a collection of tools and installation instructions of tools we commonly use in CTFs.
This is not a complete list and any instructions are only suggestions.
Any instructions are only suggestions.
Also, this is not even remotely a complete list. Many challenges depend on you finding the right tool for the job and there are far too many tools out there to list them here. But at least when dealing with Linux binaries, these are the tools we spend over 90% of our time with.
Feel free to adapt anything to your needs, if you prefer a different way, and submit feedback.
Also use this as a starting point to learn about any of the tools that are new to you.
......@@ -29,6 +31,10 @@ Alternative: [Podman](https://podman.io/).
[Ghidra](https://github.com/NationalSecurityAgency/ghidra/releases) is a powerful disassembling tool made by the NSA (Yes, *that* NSA).
- Make sure you have a recent Java JDK
- Download the latest release and extract it.
- Run `ghidraRun.sh (Mac/Linux host)` or `ghidraRun.bat (Windows host)`.
[Binary Ninja](https://binary.ninja/free/) is a more easy-to-use alternative. Does some things better than Ghidra and a few more things worse.
### Python and virtual environments
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment