This website is used to scan automatically files during CTF. (Mainly used for steganography)
git clone https://github.com/Vozec/CTFlagger.git ./CTFlagger
cd CTFlagger
docker compose build
docker compose up
The Website is available on your local machine on port 8080
Invoke-WebRequest -Uri https://localhost:8080/52062f33b7a58050c082a5f677a1ae626da32d88 -Method Get -Headers @{Api="True"} -UseBasicParsing | Select-Object -Expand Content | .\jq.exe
- Binwalk
- Strings
- Color Palette swapper
- Steghide extract
- StegSeek
- Stegoveritas
- LsbFilter
- OpenStego
- Outguess
- Pngcheck
- LSB Palette swap
- Stegpy
- Stegopvd
- StegoPit
- Stegolsb Bruteforce
- Exiftool
- Zsteg
- Jsteg
- StegExpose (Lsb)
- Stegdetect
- LsbSteg
- LsbGraph
- OpenStego
- Outguess
- Pngcheck
- Gif Frame Extractor
- Dmtf
- HideMe
- .Mid steg
- Spectrogram
- Olevba
- Pdfcrack
- Pdfparser
- Stegsnow
- Strace
- Ltrace
- Steg86
- Radare2
- .Pem/.Pub decoder (Openssl)
- KcPassword decoder
- Keepass (Hash+Bruteforce)
- KeyChain Bruteforcer (chainbreaker)
- RubberDucky bin decoder
- ZipInfo / ZipDetails / Hash Zip + Bruteforce zip password
- Tshark (HttpRequests) + DNS
- Pcapkit report
- Ssldump
- Rdpcap data & unhexlified data / UDP data
- Urlsnarf
Feel free to contribute to the project by adding different modules or suggesting future improvements