mirror of https://github.com/icsharpcode/ILSpy.git
4 changed files with 50 additions and 0 deletions
@ -0,0 +1,12 @@ |
|||||||
|
FROM mcr.microsoft.com/dotnet/sdk:8.0 |
||||||
|
|
||||||
|
RUN useradd -m -s /bin/bash ilspy |
||||||
|
USER ilspy |
||||||
|
|
||||||
|
WORKDIR /home/ilspy |
||||||
|
|
||||||
|
RUN dotnet tool install -g ilspycmd --version 9.1.0.7988 |
||||||
|
|
||||||
|
RUN echo 'export PATH="$PATH:/home/ilspy/.dotnet/tools/"' >> /home/ilspy/.bashrc |
||||||
|
|
||||||
|
ENTRYPOINT [ "/bin/bash" ] |
@ -0,0 +1,12 @@ |
|||||||
|
FROM mcr.microsoft.com/dotnet/sdk:8.0 |
||||||
|
|
||||||
|
RUN useradd -m -s /bin/bash ilspy |
||||||
|
USER ilspy |
||||||
|
|
||||||
|
WORKDIR /home/ilspy |
||||||
|
|
||||||
|
RUN dotnet tool install -g ilspycmd --version 9.1.0.7988 |
||||||
|
|
||||||
|
RUN echo 'export PATH="$PATH:/home/ilspy/.dotnet/tools/"' >> /home/ilspy/.bashrc |
||||||
|
|
||||||
|
ENTRYPOINT [ "/bin/bash", "-l", "-c" ] |
@ -0,0 +1,20 @@ |
|||||||
|
# ILSpyCmd in Docker |
||||||
|
|
||||||
|
Inspired by https://trustedsec.com/blog/hunting-deserialization-vulnerabilities-with-claude (and thus https://github.com/berdav/ilspycmd-docker) |
||||||
|
|
||||||
|
## Building the Image |
||||||
|
|
||||||
|
There are two dockerfiles available - one for interactive use of ilspycmd (exploration), and the other for driving it from the outside (automation) |
||||||
|
|
||||||
|
### Interactive |
||||||
|
|
||||||
|
`docker build -t ilspycmd:91interactive . -f Dockerfile` |
||||||
|
|
||||||
|
`docker run --rm -it -v ./:/docker ilspycmd:91interactive` |
||||||
|
|
||||||
|
### Automation |
||||||
|
|
||||||
|
`docker build -t ilspycmd:91forautomation . -f DockerfileForAutomation` |
||||||
|
|
||||||
|
`docker run --rm -v ./:/infolder -v ./out:/outfolder ilspycmd:91forautomation "/home/ilspy/.dotnet/tools/ilspycmd -p -o /outfolder /infolder/sample.dll"` |
||||||
|
|
Loading…
Reference in new issue