This is a fork S4DFarm, specialized for ICC 2023.
This service collects A&D flags from the laptops of Team Asia players, helping the team to automate flag submissions to the system while avoiding duplicated flag submissions.
Follow this guide to write your exploit.
After you wrote the exploit script, you can run it periodically by ./client/start_sploit.py
to send the result to the ExploitFarm server. Then the ExploitFarm server will send the stolen flags to the A&D control plane!
For instance:
./client/start_sploit.py --server-url http://<HOST>:5137 --server-pass <PASSWORD> ./client/icc_demo_notes.py
Run the following command to deploy the whole service:
docker compose up --build -d
Some screenshots: