Skip to main content

Python decorator for parallel exploit dispatch in Attack & Defense CTFs using the CookieFarm framework.

Project description

🍪 CookieFarm - Exploiter Manager

Language Keywords License

Python decorator for automating exploit execution in CTF Attack & Defense competitions


📦 What is it?

This package provides a @exploit_manager decorator designed to automate the parallel execution of exploits in CTF (Attack & Defense) settings, specifically for use with the CookieFarm project.

It handles:

  • Authentication with the central server
  • Retrieving team configuration
  • Automatic flag parsing from stdout

⚠️ Note: This package is not standalone. It must be used together with the CookieFarm client. The client provides the required APIs and team configurations.


📦 Installation

To install the package:

pip install cookiefarm

⚙️ How it works

The @exploit_manager decorator takes care of:

  • Calling your exploit(ip, port, name_service, flag_ids) function
  • Capturing your exploit's stdout
  • Parsing flags via regex
  • Logging the result in JSON format, including: team ID, port, service name, and the flag found

🚀 Example usage

from cookiefarm import exploit_manager
import requests

@exploit_manager
def exploit(ip, port, name_service, flag_ids):
    # Run your exploit here
    response = requests.get(f"http://{ip}:{port}/")

    # Just print the flag to stdout
    print(response.text)

# Run from the command line with arguments from CookieFarm
# python3 myexploit.py <ip_server> <password> <tick_time> <thread_number> <port> <name_service>

For execution, you have to pass the required arguments from the command line, which are provided by the CookieFarm client. The decorator will handle the rest.

python3 myexploit.py -s <server_address> -t <tick_time> -T <thread_number> -p <port> -n <name_service> -x [test mode]
Argument Description
-s or --server The address of the CookieFarm server
-t or --tick_time The time interval for the exploit execution
-T or --thread_number The number of threads to use for the exploit
-p or --port The port to target for the exploit
-n or --name_service The name of the service to exploit
-x or --test Run in test mode (does not execute the exploit)

🛠️ Requirements

  • Python ≥ 3.12
  • Working CookieFarm client installed

📝 License

Distributed under the MIT License. Feel free to use, modify, and contribute.


For any questions, suggestions, or issues, feel free to open a GitHub issue!

Created with ❤️ by ByteTheCookies (feat. @0xMatte)

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

cookiefarm-1.2.0.tar.gz (3.9 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

cookiefarm-1.2.0-py3-none-any.whl (4.1 kB view details)

Uploaded Python 3

File details

Details for the file cookiefarm-1.2.0.tar.gz.

File metadata

  • Download URL: cookiefarm-1.2.0.tar.gz
  • Upload date:
  • Size: 3.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.3

File hashes

Hashes for cookiefarm-1.2.0.tar.gz
Algorithm Hash digest
SHA256 d00491142046c6f537dbe8daee5aa50d54a17e81c48a1c7cb575dbcb1e35dc87
MD5 bca1990cb302f98471770bc7d56eee23
BLAKE2b-256 ae4917b4dc4f0ae07a1b848656026948cbe66f1ec54d5d44fd23dc309ea282e5

See more details on using hashes here.

File details

Details for the file cookiefarm-1.2.0-py3-none-any.whl.

File metadata

  • Download URL: cookiefarm-1.2.0-py3-none-any.whl
  • Upload date:
  • Size: 4.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.3

File hashes

Hashes for cookiefarm-1.2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 c9bbea2d2deddf0387cfa35a63fc9d70d6532041ab4fe1ddb47a5ea766a9437f
MD5 285dcdfcda7079d489f246f1f7abb7e3
BLAKE2b-256 81b65fa701c67e3e03041de2cf32f12124f8cd280507b34ee2e3eafb3f491052

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page