Skip to content

CookieFarm is a Attack/Defense CTF framework inspired by DestructiveFarm, developed by the Italian team ByteTheCookies. What sets CookieFarm apart is its hybrid Go+Python architecture and "zero distraction" approach: Your only task: write the exploit logic!

License

Notifications You must be signed in to change notification settings

ByteTheCookies/CookieFarm

Repository files navigation

CookieFarm Logo

Version GitHub go.mod Go version GitHub code size in bytes GitHub License

🍪 CookieFarm

CookieFarm is an Attack/Defense CTF framework inspired by DestructiveFarm, developed by the Italian team ByteTheCookies. Its strength lies in a hybrid Go + Python architecture and a zero-distraction philosophy:

🎯 Your only task is to write the exploit!

CookieFarm automates exploit distribution, flag submission, and result monitoring — allowing you to focus entirely on building powerful exploits.


🔧 Prerequisites

Make sure you have the following installed:

  • ✅ Python 3+
  • ✅ Docker

⚙️ Architecture Overview

Architecture Diagram

▶️ Getting Started

🖥️ Starting the Server

  1. Create an .env file in the server directory to configure the environment settings:

      # Server configuration
      DEBUG=false                   # Enable debug mode for verbose logging
      PASSWORD=SuperSecret  # Set a strong password for authentication
      CONFIG_FILE=true  # Set if the server takes the config from config.yml in the filesystem; otherwise, do not set the variable
      PORT=8080            # Define the port the server will listen on

⚠️ For production environments, set DEBUG=false and use a strong, unique password

  1. Start the server with Docker Compose:
    docker compose up --build

📘 For more configuration details, refer to the server documentation.


💻 Using the Client & Running Exploits

  1. Run the installation :
pip install cookiefarm

After installation, the ckc command is available globally in your terminal (or in your virtual environment if you are using one).

  1. Log in and configure the client:

    ckc config login -P SuperSecret -h 192.168.1.10 -p 8000 -u your_username
  2. Install the Python helper module and create a new exploit template:

    ckc exploit create -n your_exploit_name

    This will generate your_exploit_name.py in ~/.cookiefarm/exploits/.

  3. Run your exploit:

    ckc exploit run -e your_exploit_name.py -p 1234 -t 120 -T 40

📘 For more usage examples, check out the client documentation.


🤝 Contributing

We welcome contributions, suggestions, and bug reports! See CONTRIBUTING.md for details on how to get involved.

📈 Star History

Star History Chart
Built with ❤️ by ByteTheCookies

About

CookieFarm is a Attack/Defense CTF framework inspired by DestructiveFarm, developed by the Italian team ByteTheCookies. What sets CookieFarm apart is its hybrid Go+Python architecture and "zero distraction" approach: Your only task: write the exploit logic!

Topics

Resources

License

Security policy

Stars

Watchers

Forks

Packages

No packages published

Contributors 6