This repository has been archived by the owner on Feb 21, 2024. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 247
/
Dockerfile
55 lines (47 loc) · 1.85 KB
/
Dockerfile
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
# -------------------------------------------------------------------------------
#
# Copyright (C) 2017 Cisco Talos Security Intelligence and Research Group
#
# PyREBox: Python scriptable Reverse Engineering Sandbox
# Author: Jonas Zaddach
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2 as
# published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
# MA 02110-1301, USA.
#
# -------------------------------------------------------------------------------
FROM ubuntu:16.04
MAINTAINER Jonas Zaddach
ENV PREFIX /home
#Install packages
RUN apt-get update
RUN apt-get install -y build-essential zlib1g-dev pkg-config \
libglib2.0-dev binutils-dev libboost-all-dev \
autoconf libtool libssl-dev libpixman-1-dev \
libpython-dev python-pip \
git curl vim
#upgrade pip
RUN pip install --upgrade pip
#clone pybox
RUN git clone https://github.com/Cisco-Talos/pyrebox pyrebox
WORKDIR pyrebox
RUN pip install -r requirements.txt
RUN ./build.sh
RUN cp /usr/local/lib/python2.7/dist-packages/capstone/lib/libcapstone.so /usr/local/lib
RUN ldconfig
#OPTIONAL: Copy VM in. Left as an example
#RUN mkdir /images
#ADD files/template_pybox_vm_winxp.tar.gz /images
#RUN echo "./start_i386.sh /images/xpsp3.qcow2" > ~/.bash_history
EXPOSE 5900
ENTRYPOINT ["/bin/bash"]