Skip to content

goldfish088/6447-starter

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 

Repository files navigation

Unofficial COMP6447 Starter

Welcome to the unofficial starter codebase for COMP6447!

Prerequisites

Getting Started

Follow these steps to set up your development environment:

Clone the Repository

Clone this repository to your local machine:

git clone https://github.com/abe123442/6447-starter mypwnlab
cd mypwnlab

Open in VS Code

code .

Open the Dev Container

The development environment uses the skysider/pwndocker image, which is preloaded with tools like pwntools, gdb, and other essentials for the course.

  • Open the VS Code Command Palette (Ctrl+Shift+P or Cmd+Shift+P).
  • Run Dev Containers: Reopen in Container.

IT IS EXPECTED TO TAKE A WHILE TO INSTALL THE FIRST TIME!

Writing Your First Exploit

In the /ctf/work/ directory (mapped to your local project folder), create a new file, e.g., exploit.py.

from pwn import *

# Example: Connect to a remote service
p = remote('example.com', 12345)
p.sendline(b'Hello, CTF!')
p.interactive()

In the VS Code terminal, run:

python3 exploit.py

Tools included in this environment

Additional Resources

  • Base Image: To use a custom Dockerfile instead, edit .devcontainer/devcontainer.json and use the base image to guide you.
  • Pwntools Cheatsheet: To get you started with pwntools see this cheatsheet.
  • VS Code Dev Containers: See Developing inside a Container for advanced configuration.

Contributing

This is a starter codebase, so feel free to add your own exploit scripts, tools, or improvements. Submit pull requests if you have any improvements!

About

out of the box starter repository for tinkering around in 6447 wargames

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors