https://github.com/cookiengineer/codetheflag
:construction: Code examples that can be modified/used for CTF challenges
https://github.com/cookiengineer/codetheflag
Last synced: 3 months ago
JSON representation
:construction: Code examples that can be modified/used for CTF challenges
- Host: GitHub
- URL: https://github.com/cookiengineer/codetheflag
- Owner: cookiengineer
- Created: 2024-08-27T08:33:39.000Z (10 months ago)
- Default Branch: main
- Last Pushed: 2024-08-27T09:29:47.000Z (10 months ago)
- Last Synced: 2025-03-19T14:12:31.052Z (3 months ago)
- Language: C
- Size: 1000 Bytes
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Code The Flag
CTF code examples for future use, as I'm planning on doing a fun CTF next year.
The idea is to cover the basics of exploit development in here, so that more
complicated malware analysis/reverse engineering can be done later.# Usage
:construction: Work in Progress :construction:
# Requirements
- [ ] `gcc` needs to be installed for the C-based examples
- [ ] `go` needs to be installed for Go-based examples
- [ ] `python3` needs to be installed for Python-based examples
- [ ] Check the project-specific requirement manifests (`go.mod`, `requirements.txt`, `package.json` etc)# Development/Debugging Tools
- [ ] [GDB PEDA](https://github.com/longld/peda) (Python Exploit Development Assistance mods for GDB)
- [ ] VIM, of courseInstall all requirements via:
```bash
sudo pacman -R emacs; sudo pacman -S vim;
sudo pacman -S binutils coreutils gcc gcc-libs go python3 peda;
```# Further Resources
- [ ] https://exploit.education/
- [ ] https://ropemporium.com/# License
AGPL3