mkctf
is a convenient tool for setting up Capture the Flag (CTF) challenge environments. This script creates a standardized directory structure and initializes a Docker container with essential pentesting tools, providing a ready-to-use environment for tackling CTF challenges.
- Automatic Directory Setup: Creates a structured environment with directories for
network
,web
,creds
, andnotes
. - Docker Integration: Uses Docker to provide an isolated environment pre-configured with essential CTF tools.
- Comprehensive Toolset: Installs a wide range of pentesting tools including network utilities, web tools, password crackers, and more.
-
Clone the Repository:
git clone https://github.com/polo-sec/mkctf.git cd mkctf
-
Make the Script Executable:
chmod +x mkctf.sh
-
Add an Alias (optional but recommended): Add the following line to your
.bashrc
or.zshrc
:alias mkctf='/path/to/mkctf.sh'
Then, source the file:
source ~/.bashrc
or
source ~/.zshrc
-
Create a New Challenge Environment:
mkctf <challenge_name>
-
Navigate to the Challenge Directory:
cd <challenge_name>
-
Build and Start the Docker Container:
docker-compose up -d --build
-
Access the Running Container:
docker exec -it <challenge_name>_pentest /bin/bash
When you run mkctf <challenge_name>
, the following directory structure is created:
<challenge_name>/
├── creds/
├── docker-compose.yml
├── Dockerfile
├── network/
├── notes/
└── web/
Contributions are welcome! Please submit a pull request or open an issue to discuss any changes or suggestions.
This project is licensed under the MIT License
- Inspired by the need for a streamlined and efficient CTF preparation environment.
- Thanks to the developers of the various tools integrated into this project.