Capture The Flag competitions usually require a set of tools to help you analyze, reverse engineer and exploits challenges.
My CTF Team has therefore created a docker image containing the bare essentials that we use while running challenges in “isolation”.
While the docker container offers some isolation from the host operating system, it is necessary to run it in privileged mode, thus breaking complete isolation, to allow the ptrace system call for debugging processes. Therefore, please do not use this container for analyzing malware you suspect of breaking out of the sandboxed docker container.
The docker image source can be found on github, and a prebuilt image is automatically pushed to dockerhub under the epadctf/ctfbox tag.