Categories: Kali Linux

Microctfs – Small CTF challenges running on Docker

Microctfs is a tool for small CTF challenges running on Docker.

Microctfs Logviewer

Build and Start logviewer challenge exposed on port 8000

cd logviewer
docker build -t logviewer . 
docker run -d -p 8000:80 --name log_challenge logviewer

Restart logviewer challenge

docker rm -f log_challenge && docker run -d -p 8000:80 --name log_challenge logviewer

Stop logviewer challenge

docker rm -f log_challenge

Also Read UBoat – A POC HTTP Botnet Project

SQLI

Build and Start sqli challenge exposed on port 8883

cd sqli
docker build -t sqli . 
docker run -d -p 8883:80 --name sqli_chal sqli

Restart sqli challenge

docker rm -f sqli_chal && docker run -d -p 8883:80 --name sqli_chal sqli

Stop sqli challenge

docker rm -f sqli_chal

tcmanager

Build and Start tcmanager challenge exposed on port 8080

cd tcmanager
docker build -t tcmanager . 
docker run -d -p 8080:8080 --name tc_chal tcmanager

Restart tcmanager challenge

docker rm -f tc_chal && docker run -d -p 8080:8080 --name tc_chal tcmanager

Stop tcmanager challenge

docker rm -f tc_chal

geddy

Build and Start geddy challenge exposed on port 40000

cd geddy
docker build -t geddy . 
docker run -d -p 40000:4000 --name geddy_chal geddy

Restart geddy challenge

docker rm -f geddy_chal && docker run -d -p 40000:4000 --name geddy_chal geddy

Stop geddy challenge

docker rm -f geddy_chal

printf

Build and Start printf challenge exposed on port 1337

cd printf
docker build -t printf .
docker run -d -p 1337:1337 --name printfchal printf

Restart printf challenge

docker rm -f printfchal && docker run -d -p 1337:1337 --name printfchal printf

Stop geddy challenge

docker rm -f printfchal

xxe

Build and Start xxe challenge exposed on port 8080

cd xxe
docker build -t xxe .
docker run -d -p 8080:8080 xxe mvn jetty:run

Credit : noreply@blogger.com (Lydecker Black)

R K

Recent Posts

Admin Panel Dorks : A Complete List of Google Dorks

Introduction Google Dorking is a technique where advanced search operators are used to uncover information…

4 days ago

Best Linux Distros in 2026

Linux is renowned for its versatility, open-source nature, and security. Whether you're a beginner, developer,…

4 days ago

Top 10 Cyber Insurance Companies in 2026

Cyber insurance helps businesses and individuals mitigate financial losses from data breaches, ransomware, extortion, legal…

4 days ago

Ransomware Incident Response

Ransomware is one of the most dangerous and destructive forms of cybercrime today. With cybercriminals…

4 days ago

Best Social Media Search Engines and Tools for 2026

Social media is a key part of our daily lives, with millions of users sharing…

4 days ago

How to Remove Your Personal Information from Data Broker Websites (2026 Guide)

What Are Data Brokers? Data brokers are companies that collect, aggregate, and sell personal information,…

4 days ago