A comprehensive, interactive tool installer for CTF (Capture The Flag) competitions and cybersecurity professionals. This project provides a modular, menu-driven interface to install and configure essential security tools on Kali Linux and compatible distributions.
Install the CTF Tools installer with a single command:
curl -fsSL https://trustlab.upct.es/CTFsetup | sudo bashAfter installation, run the tool with:
autosetup- Browse tools organized by security domains
- Web Security Tools
- Binary Analysis & Reverse Engineering
- Network Security & Scanning
- Cryptography Tools
- Forensics Tools
- Development Tools
- Coming Soon: Full category implementation
- Install All Tools: Complete CTF environment setup (recommended for beginners)
- Essential Tools Only: Install just the core tools needed to get started
- Custom Selection: Advanced users can pick specific tools
- Quick start guide and tool information
- Interactive checkbox-based tool selection
- Two-column layout for easy browsing
- Quick selection presets:
- Essential CTF Tools
- Binary Analysis Tools
- Web Security Tools
- Network Tools
- Real-time selection counter
- Detailed tool information and descriptions
- Configure installed tools
- Setup development environments
- Customize tool settings
- Coming Soon: Advanced configuration options
Project Website: https://trustlab.upct.es
The project now uses a modular architecture for better maintainability and extensibility:
CTFTools/
├── setup.sh # Main entry point
├── install.sh # System installer
├── apps.json # Tool configurations
├── core_functions/ # Core functionality modules
│ ├── colors_utils.sh # Colors and utility functions
│ ├── app_manager.sh # App loading and selection management
│ └── installer.sh # Installation logic
├── menu_system/ # Menu interface modules
│ ├── main_menu.sh # Main menu system
│ └── install_menu.sh # Tool selection interface
└── scripts/ # Individual tool install scripts
Current tools include:
- Kali Linux Headless - Base system tools and fixes
- Nmap - Network exploration and security scanning
- Hashcat - Advanced password recovery
- GDB with GEF - Enhanced debugging with exploit development features
- Checksec - Binary security feature analyzer
- Burp Suite - Web application security testing
- Ghidra - NSA's reverse engineering suite
- ROPgadget - Return-oriented programming gadget finder
- Pwntools - CTF framework and exploit development library
- Neovim - Modern Vim fork with extensive plugin ecosystem
- Terminal Text Editor - Lightweight terminal-based editor
- Run
autosetup - Select
2) Beginner Setup - Choose
1) Install All Tools - Confirm installation
- Run
autosetup - Select
3) Install Tools - Use numbers to toggle specific tools
- Press
ito install selected tools
- In the Install Tools menu
- Press
rfor quick selection presets - Choose from Essential, Binary, Web, or Network tools
- OS: Kali Linux (recommended) or Debian-based distributions
- Architecture: x64/AMD64
- Dependencies:
jq,curl(automatically installed) - Privileges: Regular user with sudo access
- Internet: Required for downloading tools and updates
We welcome contributions! Here's how you can help:
- 🌟 Star the repository on GitHub
- 🐛 Report bugs and issues
- 💡 Suggest new features or tools
- 📝 Contribute code or documentation
- 📢 Share with the community
- GitHub Repository: https://github.com/varo6/CTFTools
- Issues & Bug Reports: Use GitHub Issues
- Latest Version: Always available via the installation command
This project is open source and available under standard open source licensing terms.
- Full Category Implementation: Complete tool categorization
- Advanced Configuration: Post-installation tool setup
- Tool Dependencies: Smart dependency management
- Custom Tool Addition: Add your own tools to the installer
- Export/Import Selections: Save and share tool configurations
- Installation Profiles: Predefined setups for different use cases
Made with ❤️ for the CTF and cybersecurity community
Version 1.1 - Modular Edition