From 1e534594d5d61195c0eea26f6542fc681e2a99f0 Mon Sep 17 00:00:00 2001 From: Starthur Date: Fri, 6 May 2022 13:45:56 +0200 Subject: [PATCH] Update 'README.md' --- README.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index ebf46c4..8f6cb94 100644 --- a/README.md +++ b/README.md @@ -13,7 +13,8 @@ Here is a docker image to use to solve most of the CTF on the platform! If you a ``` ## Usage -`docker run --security-opt seccomp=unconfined --rm -v $PWD:/work -it 42ctf /bin/ash` +`docker run --security-opt seccomp=unconfined --rm -v $PWD:/work -it atrouill/42ctf /bin/ash` For more simplicity you can do : -`echo 'alias 42ctf="docker run --security-opt seccomp=unconfined --rm -v $PWD:/work -it 42ctf /bin/ash"' >> ~/.zshrc && source ~/.zshrc` +`echo 'alias 42ctf="docker run --security-opt seccomp=unconfined --rm -v $PWD:/work -it atrouill/42ctf /bin/ash"' >> ~/.zshrc && source ~/.zshrc` +Then you just have to run `42ctf` in the folder where your binaries are! \ No newline at end of file