pwn setup

My setup for solving pwn challenges in CTFs consists of a docker image that is handled using some aliases that are described further down.

docker build . -t ctf:ubuntu20.10

# Dockerfile

FROM ubuntu:20.10

ENV DEBIAN_FRONTEND=noninteractive

RUN dpkg --add-architecture i386
RUN apt update -y
RUN apt upgrade -y

RUN apt install -y build-essential cmake curl dnsutils gcc gcc-multilib gdb gdb-multiarch git golang jq libc6:i386 libdb-dev libffi-dev libncurses5:i386 libpcre3-dev libssl-dev libstdc++6:i386 libxaw7-dev libxt-dev ltrace make netcat net-tools pkg-config procps python python3 python3-dev python3-pip radare2 rubygems sqlmap strace tmux upx vim wget

RUN pip install capstone requests r2pipe huepy
RUN pip3 install pwntools keystone-engine unicorn capstone ropper angr

RUN r2pm update
RUN mkdir tools && cd tools && \
git clone && \
git clone && cd radare2 && sys/ && \
cd .. && git clone && cd pwndbg && ./

bash aliases

# aliases.txt

# make (pmk <name>)
alias pmk='function _dockermk(){docker run -v "$(pwd):/pwn" \
--cap-add=SYS_PTRACE --security-opt seccomp=unconfined -d --name $1 -i \

# change directory into the /pwn folder of the container (pcd <name>)
alias pcd='function _dockercd(){docker exec -it --workdir /pwn $1 bash;};_dockercd'

# delete the container with the given name (prm <name>)
alias prm='function _dockerrm(){docker stop $1;};_dockerrm'

# list all containers using the docker image (this is hardcoded → adapt to
# your needs
alias pls='function _dockerls(){docker ps -a -f ancestor=ctf:ubuntu20.10 \
--format "{{.Names}}";};_dockerls'

fish functions

# aliases_fish.txt

function pmk --argument name
    docker run --rm -v (pwd)':/pwn' --cap-add=SYS_PTRACE --security-opt seccomp=unconfined -d --name $name -i ctf:ubuntu20.10

function pcd --argument name
    docker exec -it -e TERM=xterm-256color --workdir /pwn $name bash

function prm --argument name
    docker stop $name

function pls
    docker ps -a -f ancestor=ctf:ubuntu20.10 --format '{{.Names}}'