From e9f866f6fb86aee9dafb03ecc3f4fd4274ae2109 Mon Sep 17 00:00:00 2001 From: Starthur Date: Fri, 6 May 2022 13:46:45 +0200 Subject: [PATCH] Update 'README.md' --- README.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/README.md b/README.md index 8f6cb94..2d391fb 100644 --- a/README.md +++ b/README.md @@ -16,5 +16,7 @@ Here is a docker image to use to solve most of the CTF on the platform! If you a `docker run --security-opt seccomp=unconfined --rm -v $PWD:/work -it atrouill/42ctf /bin/ash` For more simplicity you can do : + `echo 'alias 42ctf="docker run --security-opt seccomp=unconfined --rm -v $PWD:/work -it atrouill/42ctf /bin/ash"' >> ~/.zshrc && source ~/.zshrc` + Then you just have to run `42ctf` in the folder where your binaries are! \ No newline at end of file