人工智能 CTF轻工具个人集合

liushui008 · March 08, 2020 · 31 hits

持续更新 ing

可能以后还会重新整理

在线解密

http://www.practicalcryptography.com/ciphers/

直链列表:

另一个网站: WordCounter 英文论文单词统计

另一个维吉尼亚:https://atomcated.github.io/Vigenere/

另一个维吉尼亚:http://www.mygeocachingprofile.com/codebreaker.vigenerecipher.aspx

另一个维吉尼亚:https://f00l.de/hacking/vigenere.php

文字加密解密: http://www.qqxiuzi.cn/bianma/wenbenjiami.php

单表替换:https://quipqiup.com/

pycipher

数论计算器

https://www.alpertron.com.ar/CALTORS.HTM

Brainfuck

http://esoteric.sange.fi/brainfuck/impl/interp/i.html

PWN-cheatsheet

https://github.com/Naetw/CTF-pwn-tips

PHP 代码在线执行

http://sandbox.onlinephpfunctions.com/

在线扫码

https://online-barcode-reader.inliteresearch.com/

MD5 破解

https://somd5.com/

http://www.md5online.org/

HASH 破解

https://www.onlinehashcrack.com/

https://crackstation.net/

在线 OCR

http://jinapdf.com/cn/image-to-text-file.php

http://ocr.wdku.net/

base 家族自动解

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42

# Python3
# AutoBase.py
from base64 import *
s = input()
lis1 = [s]
lis2 = []
lis3 = []
lis4 = []
while(1):
for a in lis1:
ok = 0
try:
lis2.append(b64decode(a).decode('ascii'))
ok = 1
except:
pass
try:
lis2.append(b32decode(a).decode('ascii'))
ok = 1
except:
pass
try:
lis2.append(b16decode(a).decode('ascii'))
ok = 1
except:
pass
if not ok:
lis3.append(a)
if not len(lis2):
break
lis1=lis2.copy()
lis2.clear()
for a in range(0,len(lis3)):
ok = 1
for b in lis3[a]:
if ord(b)>126 or ord(b)<32:
ok = 0
break
if ok:
lis4.append(lis3[a])
print(lis4)

漏洞平台

http://www.cnnvd.org.cn/

http://www.cnvd.org.cn/

http://exploit-db.com

http://www.exploit-id.com/

http://cve.mitre.org/

http://www.securiteam.com/

http://securityvulns.com/ (更新至 2015.02.11)

http://securityvulns.ru/

http://www.securityfocus.com/

http://marc.info/?l=bugtraq

http://www.securitytracker.com/

https://packetstormsecurity.com/

题目

https://ctftime.org/

http://shell-storm.org/repo/

https://www.jarvisoj.com/

http://oj.xctf.org.cn/web/login/?next=/

http://www.shiyanbar.com/ctf/practice

http://ctf.nuptsast.com/

https://cgctf.nuptsast.com

https://skidophrenia.ctfd.io/

https://www.ichunqiu.com/battalion

http://cxsecurity.com/exploit/

http://reversing.kr/

http://pwnable.kr/

http://codeengn.com/challenges/

https://exploit-exercises.com/

https://io.netgarage.org/

http://hackinglab.cn/

http://captf.com/

http://www.baimaoxueyuan.com/ctf

http://hkyx.myhack58.com/index.html

http://overthewire.org/wargames/krypton/

https://backdoor.sdslabs.co/

http://www.hetianlab.com/CTFrace.html

http://security.cs.rpi.edu/courses/binexp-spring2015/

http://www.wechall.net/challs

http://smashthestack.org/wargames.html

https://microcorruption.com/login

https://www.hackthissite.org/pages/index/index.php

https://exploit-exercises.com/protostar/

http://ctf.bugku.com/challenges

https://id0-rsa.pub/

No Reply at the moment.
You need to Sign in before reply, if you don't have an account, please Sign up first.