This repository contains a collection of utility scripts for Capture The Flag (CTF) competitions and similar cybersecurity events. These tools are designed to assist in various aspects of CTF management, analysis, and data processing.
This script analyzes IP address usage across different teams, identifies shared IPs between teams, and provides ISP information for each IP address. It's designed to help detect potential collaboration or account sharing between teams in a competition.
- Load and process tracking data, user data, and team data from CSV files
- Identify IP addresses shared between different teams
- Filter out Cloudflare and other ignored IP ranges
- Retrieve ISP information for each shared IP address
- Display results in a formatted table in the console
- Export results to a CSV file
-
Prepare your input CSV files:
tracking.csv
: Contains IP tracking datausers.csv
: Contains user informationteams.csv
: Contains team information
-
Run the script:
python ip-scan.py
-
The script will display the results in the console and export them to
shared_ips_results.csv
.
For more detailed information about ip-scan.py, including input file formats and output structure, please see the ip-scan.py documentation.
- Python 3.6+
- pip (Python package installer)
-
Clone this repository:
git clone https://github.com/degun-osint/CTFdUtils cd CTFdUtils
-
Install the required Python packages:
pip install -r requirements.txt
Contributions are welcome! If you have ideas for new scripts or improvements to existing ones, please feel free to submit a Pull Request or open an Issue.
- IP-API for providing ISP information in ip-scan.py
- PrettyTable for console table formatting in ip-scan.py
We plan to add more utility scripts to this repository in the future. Stay tuned for updates!