A parody Debian-based Linux distribution inspired by Amazon Linux 2/AL2023, built specifically for CTF scenarios and educational purposes.
- 🎯 CTF-Optimized: Minimal attack surface with essential tools pre-installed
- 🛠️ Terraform Ready: HashiCorp repository configured with Terraform pre-installed
- 📦 Multi-Format: Available as both container images and VM disk images
- 🏗️ Multi-Architecture: Supports AMD64 and ARM64 architectures
- 🚀 Automated Builds: GitHub Actions CI/CD with security scanning
# Pull the latest image
docker pull ghcr.io/your-username/shart.linux:latest
# Run interactively
docker run -it --rm ghcr.io/your-username/shart.linux:latest
# Check Terraform installation
docker run --rm ghcr.io/your-username/shart.linux:latest terraform version- Download VM images from the releases page
- Choose your format:
shart-linux.qcow2for QEMU/KVMshart-linux.vmdkfor VMware
# Download the qcow2 image
wget https://github.com/your-username/shart.linux/releases/latest/download/shart-linux.qcow2
# Boot with QEMU
qemu-system-x86_64 -m 512 -hda shart-linux.qcow2Import the shart-linux.vmdk file into VMware Workstation/vSphere.
- Root:
root/shart123 - User:
ctfuser/shart123
docker build -t shart.linux:local container/
docker run -it --rm shart.linux:local# Requires root privileges
sudo ./scripts/build-vm.sh qcow2
# or
sudo ./scripts/build-vm.sh vmdkshart.linux/
├── assets/
│ └── motd.txt # ASCII art MOTD
├── container/
│ └── Dockerfile # Container image definition
├── scripts/
│ └── build-vm.sh # VM image build script
├── vm/ # VM-specific configurations
├── .github/workflows/
│ └── build.yml # CI/CD pipeline
└── CLAUDE.md # Development guidance
Features custom ASCII art branding that displays on login, parodying Amazon Linux.
Pre-configured with official HashiCorp Debian repository for easy installation of:
- Terraform (pre-installed)
- Vault, Consul, Nomad (available via
apt install)
- Hostname:
shart-linux - Custom shell prompt:
[user@shart-linux dir]$ - Minimal service footprint for security
- SSH enabled for VM images
- CTF Competitions: Isolated, controlled environment for challenges
- Security Training: Practice environment with known configurations
- Development: Terraform testing and development
- Educational: Learning Linux system administration
- Default passwords are intentionally weak for CTF scenarios
- Change default credentials in production use
- Images undergo automated security scanning via Trivy
- Minimal package installation reduces attack surface
- Fork the repository
- Create a feature branch
- Make your changes
- Test locally using the build commands above
- Submit a pull request
This project is for educational and entertainment purposes. See LICENSE for details.
This is a parody project and is not affiliated with Amazon Web Services or Amazon Linux. It's designed purely for educational and CTF purposes.