Skip to content

Commit 4d36322

Browse files
authored
Merge pull request #113 from ThePorgs/dev
Fixing tool name and examples, format error and contribution docs
2 parents 1af48c4 + f626713 commit 4d36322

File tree

4 files changed

+39
-13
lines changed

4 files changed

+39
-13
lines changed

docs/src/contribute/images.md

Lines changed: 30 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -177,11 +177,17 @@ function install_yourtool() {
177177
== Download release
178178
```bash
179179
function install_yourtool() {
180+
# CODE-CHECK-WHITELIST=add-aliases
180181
colorecho "Installing yourtool"
181182
local URL
182-
URL=$(curl --location --silent "https://api.github.com/repos/AUTHOR/REPO/releases/latest" | grep 'browser_download_url' | grep -o 'https://[^"]*' | grep 'linux' | grep "$arch")
183+
curl --location --silent --output /tmp/meta.json "https://api.github.com/repos/AUTHOR/REPO/releases/latest"
184+
URL=$(cat /tmp/meta.json | grep 'browser_download_url' | grep -o 'https://[^"]*' | grep 'linux' | grep "$arch")
185+
if [[ -z "$URL" ]]; then
186+
cat /tmp/meta.json
187+
fi
188+
rm /tmp/meta.json
183189
curl --location -o /tmp/yourtool.tar.xz "$URL"
184-
tar -xf /tmp/yourtool.tar.xz --directory /tmp
190+
tar -xzf /tmp/yourtool.tar.xz --directory /tmp
185191
rm /tmp/yourtool.tar.xz
186192
mv /tmp/yourtool/yourtool /opt/tools/bin/yourtool
187193
add-history yourtool
@@ -190,9 +196,29 @@ function install_yourtool() {
190196
}
191197
```
192198

193-
> [!NOTE]
194-
> Install tools in `/opt/tools/` or place binaries in `/opt/tools/bin/`.
199+
== Via install script
200+
201+
Installing tools via external install scripts is to be avoided for the following reasons:
202+
203+
- **Trust and security:** running code from the Internet, which could be modified at any time without your knowledge.
204+
- **Lack of transparency:** can't easily audit what the script will do in advance.
205+
- **Reproducibility:** scripts may change or disappear, breaking reproducibility.
206+
- **Silent failures:** install scripts may change system settings, fail quietly, or have unexpected side effects not tracked by package managers.
207+
208+
Prefer using distribution packages, versioned binaries, or building from source for safer and more maintainable installs.
195209

210+
```bash
211+
function install_yourtool() {
212+
colorecho "Installing yourtool"
213+
curl --location --silent --output /tmp/install_thetool.json "https://sometool.com/install"
214+
bash /tmp/install_thetool.json
215+
rm /tmp/install_thetool.json
216+
add-history yourtool
217+
add-history yourtool
218+
add-test-command "yourtool --help"
219+
add-to-list "yourtool,https://github.com/AUTHOR/REPO,description"
220+
}
221+
```
196222
:::
197223

198224
### Temporary fixes (tempfix)

docs/src/images/my-resources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -267,7 +267,7 @@ or you can add a new folder:
267267
268268
> [!WARNING]
269269
> This covers the previous method for personalizing Firefox; the current
270-
> approach utilizes `` policy <`firefox `` (policy)\>\`.
270+
> approach uses [firefox policy](#firefox-policy).
271271
272272
> [!INFO]
273273
> Available from version `3.0.2` to `3.1.5` of any exegol image.

docs/src/tips-and-tricks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ commands in the history, without changing the values every time.
7474
- `shellerator` can be used to generate a reverse-shell command dynamically.
7575
- On the attacker's side, a reverse shell obtained through a `netcat` tunnel can be improved (see [ropnop.com](https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/) or [0xffsec.com](https://0xffsec.com/handbook/shells/full-tty/)).
7676
- A simple alternative to upgrading a netcat reverse shell is to use `rlwrap <netcat listener command>`.
77-
- Instead of using `netcat` and "upgrading" the shell manually, `pwncat-cs` ([calebstewart/pwncat](https://github.com/calebstewart/pwncat)) can be used to obtain an even better reverse-shell experience, especially with UNIX-like targets.
77+
- Instead of using `netcat` and "upgrading" the shell manually, `pwncat-vl` ([Chocapikk/pwncat-vl](https://github.com/Chocapikk/pwncat-vl)) can be used to obtain an even better reverse-shell experience, especially with UNIX-like targets.
7878

7979
## Keyboard shortcuts
8080

docs/src/wrapper/cli/exec.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -50,18 +50,18 @@ exegol exec demo bloodhound
5050
# Execute the command 'nmap -h' with console output in the container demo:
5151
exegol exec -v demo 'nmap -h'
5252

53-
# Execute a command in background within the demo container:
53+
# Execute the command bloodhound in background within the demo container:
5454
exegol exec -b demo bloodhound
5555

56-
# Execute the command bloodhound in a temporary container based on the full image:
57-
exegol exec --tmp full bloodhound
56+
# Execute the command bloodhound with neo4j in a temporary container based on the full image:
57+
exegol exec --tmp full 'neo4j start && bloodhound'
5858

59-
# Execute a command in background with a temporary container:
60-
exegol exec -b --tmp full bloodhound
59+
# Execute the command bloodhound with neo4j in background with a temporary container:
60+
exegol exec -b --tmp full 'neo4j start && bloodhound'
6161

6262
# Execute Wireshark in background, in a privileged temporary container:
63-
exegol exec --background --tmp --privileged "nightly" "wireshark"
63+
exegol exec --background --tmp --privileged nightly wireshark
6464

65-
# Execute the command wireshark with network admin privileged:
65+
# Execute the command wireshark with network admin privileges:
6666
exegol exec -b --tmp --cap NET_ADMIN full wireshark
6767
```

0 commit comments

Comments
 (0)