GitHub - Vozec/CTFlagger: This website is used to automatically scan files during CTF.

This website is used to scan automatically files during CTF. (Mainly used for steganography)

Setup :

git clone https://github.com/Vozec/CTFlagger.git ./CTFlagger
cd CTFlagger
docker compose build
docker compose up

The Website is available on your local machine on port 8080

Home :

Alt Text Alt Text

Result:

Alt Text

Api Endpoint to retrieve results :

Invoke-WebRequest -Uri https://localhost:8080/52062f33b7a58050c082a5f677a1ae626da32d88 -Method Get -Headers @{Api="True"} -UseBasicParsing  | Select-Object -Expand Content | .\jq.exe

Alt Text

Features :

All:

  • Binwalk
  • Strings

Images:

  • Color Palette swapper
  • Steghide extract
  • StegSeek
  • Stegoveritas
  • LsbFilter
  • OpenStego
  • Outguess
  • Pngcheck
  • LSB Palette swap
  • Stegpy
  • Stegopvd
  • StegoPit
  • Stegolsb Bruteforce
  • Exiftool
  • Zsteg
  • Jsteg
  • StegExpose (Lsb)
  • Stegdetect
  • LsbSteg
  • LsbGraph
  • OpenStego
  • Outguess
  • Pngcheck
  • Gif Frame Extractor

Audio:

  • Dmtf
  • HideMe
  • .Mid steg
  • Spectrogram

Document:

  • Olevba
  • Pdfcrack
  • Pdfparser
  • Stegsnow

ELF:

  • Strace
  • Ltrace
  • Steg86
  • Radare2

Other:

  • .Pem/.Pub decoder (Openssl)
  • KcPassword decoder
  • Keepass (Hash+Bruteforce)
  • KeyChain Bruteforcer (chainbreaker)
  • RubberDucky bin decoder
  • ZipInfo / ZipDetails / Hash Zip + Bruteforce zip password

Network:

  • Tshark (HttpRequests) + DNS
  • Pcapkit report
  • Ssldump
  • Rdpcap data & unhexlified data / UDP data
  • Urlsnarf

Feel free to contribute to the project by adding different modules or suggesting future improvements