Skip to content

n1ck-n4m3/eCTF-Red-Team-Tookit

 
 

Repository files navigation

eCTF Red Team Toolkit

🚀 Everything about red teaming for the 2025 MITRE eCTF.

Table of Contents


Overview

The eCTF Red Team Toolkit is a collection of offensive security tools designed for the 2025 MITRE Embedded Capture The Flag (eCTF) competition. We aim to develop custom exploitation, reverse engineering, fuzzing, and cryptanalysis tools to assess and attack embedded systems in a controlled and ethical manner.

We are a team from Johns Hopkins University (JHU) competing in eCTF 2025, bringing expertise in offensive security, embedded systems, cryptography, and hardware hacking.


Features

Custom Exploits – Tools specifically designed for embedded system attacks.
Firmware Reverse Engineering – Extract and analyze firmware for vulnerabilities.
Side-Channel & Hardware Attacks – Investigate power, timing, and fault injection vulnerabilities.
Secure Boot & Crypto Bypass – Target weak cryptographic implementations.
Automated Fuzzing – Identify security flaws using dynamic input generation.
Attack Automation – Streamline red team operations with scripts and frameworks.


Installation & Usage

First, clone the repository:

git clone https://github.com/YOUR-USERNAME/ectf-red-team-toolkit.git
cd ectf-red-team-toolkit

Each tool has its own README with setup instructions and dependencies.


Tools Included

Exploitation

  • ROP & Shellcode Tools – Build and execute return-oriented programming (ROP) chains.
  • JTAG & UART Exploiters – Interact with embedded debugging interfaces.
  • Fault Injection Scripts – Simulate voltage glitches and clock manipulation attacks.

Firmware Analysis

  • Firmware Extractor – Unpack and analyze firmware images.
  • Binary Reversing Toolkit – Identify and analyze functions in compiled firmware.
  • Symbol Recovery – Extract useful information from stripped binaries.

Side-Channel & Hardware Attacks

  • Power Analysis – Measure and exploit power consumption patterns.
  • Timing Attacks – Detect vulnerabilities in cryptographic implementations.
  • EM Analysis – Investigate electromagnetic leakage for potential attacks.

Secure Boot & Crypto Attacks

  • Crypto Weakness Analyzer – Find vulnerabilities in cryptographic implementations.
  • Secure Boot Exploiter – Analyze and attack bootloader security.
  • Key Extraction – Identify and extract hardcoded or leaked cryptographic keys.

Fuzzing

  • Embedded Fuzzing Framework – Automate fuzzing of firmware and embedded applications.
  • Peripheral Emulator – Simulate hardware inputs to trigger unexpected behaviors.
  • Protocol Fuzzers – Test robustness of embedded communication protocols (UART, SPI, CAN, etc.).

Automation

  • Red Team Attack Scripts – Automate common attack vectors.
  • Payload Generator – Create and inject payloads into embedded systems.
  • Exploit Framework – Modular system for scripting and deploying attacks.

Contributing

We welcome contributions from teammates and the security community!

  1. Fork the repository.

  2. Create a feature branch: git checkout -b feature-xyz

  3. Commit changes and push:

    git add .
    git commit -m "Added feature XYZ"
    git push origin feature-xyz
  4. Open a Pull Request for review.


License

This project is for educational and research purposes only. Unauthorized use for malicious purposes is strictly prohibited.


Contact

📧 Team Lead: [Your Contact Info]
🔗 MITRE eCTF: https://ectf.mitre.org
🏛 JHU Security Team: [Your Team’s Website or Social Media]

🚀 Let's own eCTF 2025! 🚀

About

Everything about red teaming for eCTF.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 97.1%
  • Shell 2.9%