This VS Code environment is specifically setup for Capture The Flag (CTF) challenges, using the security tools of Parrot Security OS (headless version) within a Docker container. It includes several additional toolkits pre-installed as well and is compatible with Linux/Mac/Windows.
- Pre-installed Toolkits: Comes with a wide array of security tools from Parrot Security OS, ready out of the box as well as several additional security/hacking tools.
- X11 Forwarding: Supports X11 forwarding with VNC using fluxbox to run GUI applications in a headless setup.
- GitHub Codespaces: Effortlessly set up in a cloud environment with GitHub Codespaces, enabling cloud-based hacking without hassle.
- Cross-Platform: Works out of the box with Linux/Mac/Windows.
- Docker (Version 20.10 or later)
- VSCode with Dev Containers Extension
- Git
- RealVNC Viewer - Lite [optional]
-
Clone the repository:
git clone https://github.com/simonthorell/ctf-parrot-env.git
-
Ensure Docker is running on your local machine:
- Using Linux, start Docker using terminal.
sudo systemctl start docker
- Using Mac/Windows, start the Docker desktop deamon.
-
Open the project in VSCode:
cd ctf-parrot-env code .
-
Rebuild in Container:
- Open the Command Palette (
CMD+Shift+P
on Mac,Ctrl+Shift+P
on Windows/Linux). - Type and select
Remote-Containers: Rebuild and Reopen in Container
.
Note! VS Code may automatically ask you to Rebuild and Reopen in container.
- Open the Command Palette (
-
Open RealVNC Viewer on your local machine:
- Sign in to your RealVNC account (or create a new account) to get Lite/Free version.
- Connect to
localhost:5901
. - Enter Password:
parrot
(or as defined in Dockerfile). - In the VS-code terminal, run
xeyes
orghidraRun
to make sure the X11 VNC forwarding is working for GUI applications as we are running a headless version of parrot OS.
List in progress!
Contributions are welcome. Please fork the repository, make your changes, and submit a pull request.
Distributed under the MIT License. See LICENSE
for more information.