Metadata-Version: 2.1
Name: v0tools
Version: 0.0.1
Summary: This collection of tools helps navigate some of the more tedious parts of CTF'ing
Home-page: https://v0tools.stev0.me
Author: Steven Hollingsworth (stev0)
Author-email: hollingsworth.stevend@gmail.com
License: MIT
Project-URL: Changes, https://github.com/shollingsworth/v0tools/blob/main/CHANGELOG.md
Project-URL: Source Code, https://github.com/shollingsworth/v0tools
Project-URL: Issue Tracker, https://github.com/shollingsworth/v0tools/issues/
Project-URL: Twitter, https://twitter.com/_stevo
Project-URL: Documentation, https://v0tools.stev0.me
Description: **This package is for those participating in hacking CTFs and want some tools to help with some of the more tedious tasks.**
        
        **Enjoy!**
        
        **Pull requests welcome. :)**
        
        ## Installation / Quickstart
        
        > **To install this package from [pypy](https://pypi.org/project/v0tools/) run the following command.**
        
        ```bash
        pip3 install v0tools
        ```
        
        
        Full documentation can be found at [https://v0tools.stev0.me](https://v0tools.stev0.me)
        
        ### Commands
        
        * *[cmd-not-found.py](https://v0tools.stev0.me/commands/cmd-not-found/)*
            * Print how to install packages on different operating systems
        
        * *[cmdrec.py](https://v0tools.stev0.me/commands/cmdrec/)*
            * Terminal Recorder using ffmpeg and KDE Console.
        
        * *[dnsrebind.py](https://v0tools.stev0.me/commands/dnsrebind/)*
            * dns rebinding fqdn.
        
        * *[ip_urls.py](https://v0tools.stev0.me/commands/ip_urls/)*
            * Generate a list of obfuscated ip variations and print to stdout.
        
        * *[linrshell.py](https://v0tools.stev0.me/commands/linrshell/)*
            * Linux Reverse Shell stager.
        
        * *[php_search_vuln.py](https://v0tools.stev0.me/commands/php_search_vuln/)*
            * Search for vulnerable calls / strings in php code.
        
        * *[unicodes.py](https://v0tools.stev0.me/commands/unicodes/)*
            * print unicode values and associated information to stdout.
        
        * *[v0_bash_complete_msfvenom.py](https://v0tools.stev0.me/commands/v0_bash_complete_msfvenom/)*
            * Sourceable Autocomplete for msfvenom flags.
        
        * *[v0serv.py](https://v0tools.stev0.me/commands/v0serv/)*
            * HTTP Serve a directory, or serve a single isolated file.
        
        * *[v0upload.py](https://v0tools.stev0.me/commands/v0upload/)*
            * HTTP server that accepts PUT requests from remotes.
        
        * *[winrshell.py](https://v0tools.stev0.me/commands/winrshell/)*
            * Windows Reverse Shell stager.
        
        
        ### License
        See: [LICENSE](./LICENSE)
        
        
        ## Api
        
        > **API Documentation can be found [here](https://v0tools.stev0.me/api)**
Keywords: hacking,ctf,crypto
Platform: UNKNOWN
Classifier: Development Status :: 3 - Alpha
Classifier: Environment :: Console
Classifier: License :: OSI Approved :: MIT License
Classifier: Intended Audience :: End Users/Desktop
Classifier: Intended Audience :: Information Technology
Classifier: Operating System :: POSIX :: Linux
Classifier: Programming Language :: Python :: 3 :: Only
Classifier: Programming Language :: Python :: 3.6
Classifier: Programming Language :: Python :: 3.7
Classifier: Programming Language :: Python :: 3.8
Classifier: Programming Language :: Python :: 3.9
Classifier: Topic :: Security
Classifier: Topic :: Security :: Cryptography
Requires-Python: >=3.6
Description-Content-Type: text/markdown
