A simple Docker container sandbox with common reverse-engineering and debugging tools
(The base image is FROM python
, which is using Ubuntu 5.15 x86_64 as of Oct 2024)
- Install Docker
Note: There are two different containers that can be used: the normal version, and a full version with more tools available
git clone https://github.com/dustinbowers/debug-sandbox
cd debug-sandbox
./build.sh
./run_shell.sh
The included scripts can be used to build and drop into a shell of the chosen sandbox container.
The host drive/
directory is mounted in the container at /app/drive
- This includes most of the tools and libraries listed below
- Build the container:
./build.sh
(or rundocker compose build sandbox
) - Drop into a container shell with
./run_shell.sh
(or rundocker compose sandbox /bin/bash
)
- This includes everything in the normal version, and also includes: angr, claripy, unicorn-engine, and keystone-engine
- Note: the resultant container image is larger, and takes longer to build
- Build the container:
./build_full.sh
(or rundocker compose build sandbox-full
) - Drop into a container shell with
./run_shell_full.sh
(or rundocker compose run sandbox-full /bin/bash
)
- pwntools
- (Full) Angr
- (Full) Unicorn Engine
- (Full) Claripy
- (Full) Keystone-Engine
Alias | Command |
---|---|
dbg_protections <file> |
rabin2 -I <file> |
dbg_strings <file> |
rabin2 -z <file> |
dbg_functions_all <file> |
rabin2 -qs <file> |
dbg_functions_imported <file> |
rabin2 -i <file> |
dbg_functions_user <file> |
rabin2 -qs <file> | grep -vE 'imp| 0 ' |
dbg_elf_sections <file> |
readelf -S <file> |
dbg_objdump_disassemble <file> |
objdump -Mintel -d <file> |