8000 GitHub - senges/hax: Manage your CTF tools in dockers
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
This repository was archived by the owner on May 17, 2024. It is now read-only.

senges/hax

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

44 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Hax

Manage your CTF environment using docker images.

Install

I'm working on releasing a pip package to simplify hax install.

Requirements :

  • python3
  • pip
  • docker
➜  git clone --depth 1 https://github.com/senges/hax.git /opt/hax
➜  pip install --user -r /opt/hax/requirements.txt
➜  ln -s /opt/hax/hax.py /usr/local/sbin/hax

To start using hax, it is recommanded to run hax config in the first place.
You will be asked a few questions such as your ngrok token (for expose feature), and optionnal custom volumes, env vars.

➜  hax config

Default config include :

  • Volume : /tmp:/tmp (read-write)
  • Volume : $HOME/.ssh:/root/.ssh (read-only)
  • Env : NGROK_TOK

Usage

➜  hax -h
Usage: hax [OPTIONS] COMMAND [ARGS]...

Options:
  -h, --help  Show this message and exit.

Commands:
  config    Configure hax
  expose    Expose TCP endpoint using ngrok
  list      List local images
  pull      Pull image and exit
  refresh   Pull latest version of local images
  run       Run ctf environment
  build     Build images from source    # Not yet implemented
  wordlist  Manage wordlists            # Not yet implemented

# run

If you just want to run default image, hax command alone is enough !

➜  hax run <image>

Available images

Legacy image is just top layer image and is not aimed to be run by its own

# list

List local hax images.

➜  hax list
┌──────────┬────────┬───────┐
│ Images   │   Size │ State │
├──────────┼────────┼───────┤
│ legacy   │ 279 Mo │   ✓   │
│ hax      │ 490 Mo │   ✓   │
│ minimal  │      - │   ✗   │
│ expose   │  30 Mo │   ✓   │
│ msf      │ 586 Mo │   ✓   │
│ cracking │ 289 Mo │   ✓   │
│ osint    │      - │   ✗   │
└──────────┴────────┴───────┘

# expose

Expose local port using ngrok.
For example, to expose a local mysql database :

➜  hax expose 3306

# pull

Pull one image from above.

➜  hax pull msf
~ Pulling image hax:msf from registry
✓ Image hax:msf pull done

# refresh

Pull latest version of local images only.

Images

Tools hax cracking msf expose
arjun
assetfinder
cupp
dirsearch
exiftool
fcrackzip
ffuf
foremost
hashcat
john
metasploit
mysql
ngrok
nikto
nmap
php
pydictor
python3
samdump2
searchsploit.min
sherlock
sqlmap
zsh

Other features

  • List installed tools in the docker : tools
  • Add custom volumes / env vars is config file using hax config

Create your own !

FROM hax:legacy

# Install any tool from scripts folder
RUN /install.sh any

ENTRYPOINT /some/bin

About

Manage your CTF tools in dockers

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published
0