Welcome to the unofficial starter codebase for COMP6447!
- Docker
- Visual Studio Code and the extensions below:
- "Dev Containers" (
ms-vscode-remote.remote-containers).
- "Dev Containers" (
Follow these steps to set up your development environment:
Clone this repository to your local machine:
git clone https://github.com/abe123442/6447-starter mypwnlab
cd mypwnlabcode .The development environment uses the skysider/pwndocker image, which is preloaded with tools like pwntools, gdb, and other essentials for the course.
- Open the VS Code Command Palette (
Ctrl+Shift+PorCmd+Shift+P). - Run
Dev Containers: Reopen in Container.
IT IS EXPECTED TO TAKE A WHILE TO INSTALL THE FIRST TIME!
In the /ctf/work/ directory (mapped to your local project folder), create a new file, e.g., exploit.py.
from pwn import *
# Example: Connect to a remote service
p = remote('example.com', 12345)
p.sendline(b'Hello, CTF!')
p.interactive()In the VS Code terminal, run:
python3 exploit.py- pwntools
- pwndbg
- pwngdb
- ROPgadget
- roputils
- one_gadget
- angr
- radare2
- seccomp-tools
- linux_server[64]
- tmux
- ltrace
- strace
- Base Image: To use a custom Dockerfile instead, edit
.devcontainer/devcontainer.jsonand use the base image to guide you. - Pwntools Cheatsheet: To get you started with pwntools see this cheatsheet.
- VS Code Dev Containers: See Developing inside a Container for advanced configuration.
This is a starter codebase, so feel free to add your own exploit scripts, tools, or improvements. Submit pull requests if you have any improvements!