All Projects → mablanco → docker-osmedeus

mablanco / docker-osmedeus

Licence: GPL-3.0 License
Docker image for Osmedeus, a fully automated offensive security tool for reconnaissance and vulnerability scanning

Programming Languages

Dockerfile
14818 projects

Projects that are alternatives of or similar to docker-osmedeus

Deep-Inside
Command line tool that allows you to explore IoT devices by using Shodan API.
Stars: ✭ 22 (-71.79%)
Mutual labels:  pentesting
Elliot
A pentesting tool inspired by mr robot and derived by zphisher
Stars: ✭ 23 (-70.51%)
Mutual labels:  pentesting
JWTweak
Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.
Stars: ✭ 85 (+8.97%)
Mutual labels:  pentesting
CVE-2020-0688-Scanner
Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.
Stars: ✭ 38 (-51.28%)
Mutual labels:  pentesting
Raven-Storm
Raven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python. Takedown many connections using several exotic and classic protocols.
Stars: ✭ 235 (+201.28%)
Mutual labels:  pentesting
PowerProxy
PowerShell SOCKS proxy with reverse proxy capabilities
Stars: ✭ 29 (-62.82%)
Mutual labels:  pentesting
quick-recon.py
Do some quick reconnaissance on a domain-based web-application
Stars: ✭ 13 (-83.33%)
Mutual labels:  pentesting
Red-Team-Essentials
This repo will contain some basic pentest/RT commands.
Stars: ✭ 22 (-71.79%)
Mutual labels:  pentesting
SQLbit
Just another script for automatize boolean-based blind SQL injections. (Demo)
Stars: ✭ 30 (-61.54%)
Mutual labels:  pentesting
NewNtdllBypassInlineHook CSharp
Load a fresh new copy of ntdll.dll via file mapping to bypass API inline hook.
Stars: ✭ 35 (-55.13%)
Mutual labels:  pentesting
awesome-list-of-secrets-in-environment-variables
🦄🔒 Awesome list of secrets in environment variables 🖥️
Stars: ✭ 538 (+589.74%)
Mutual labels:  pentesting
EvilUSB
Quick utility to craft executables for pentesting and managing reverse shells
Stars: ✭ 33 (-57.69%)
Mutual labels:  pentesting
wifi-deauther
A fully automatic wifi deauther coded in Python
Stars: ✭ 25 (-67.95%)
Mutual labels:  pentesting
xssmap
Intelligent XSS detection tool that uses human techniques for looking for reflected cross-site scripting (XSS) vulnerabilities
Stars: ✭ 107 (+37.18%)
Mutual labels:  pentesting
sub404
A python tool to check subdomain takeover vulnerability
Stars: ✭ 205 (+162.82%)
Mutual labels:  pentesting
avain
A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks
Stars: ✭ 56 (-28.21%)
Mutual labels:  pentesting
offensive-docker-vps
Create a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.
Stars: ✭ 66 (-15.38%)
Mutual labels:  pentesting
QuickScan
Port scanning and domain utility.
Stars: ✭ 26 (-66.67%)
Mutual labels:  pentesting
ShonyDanza
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: ✭ 86 (+10.26%)
Mutual labels:  pentesting
linux-rootkits-red-blue-teams
Linux Rootkits (4.x Kernel)
Stars: ✭ 56 (-28.21%)
Mutual labels:  pentesting

docker-osmedeus v4

Description

Docker image for Osmedeus, a fully automated offensive security tool for reconnaissance and vulnerability scanning (https://github.com/j3ssie/Osmedeus). This image is built upon Debian's Bullseye slim image.

On 1st January 2022, Osmedeus' main developer (j3ssie) launched a beta of the new 4.0 version, which superseeds the previous v2 based on Django. While this README covers v4, the READMEv2 file covers both the 1.5 and the 2.x versions.

From v4.0.0 on, the Docker image latest tag references the newest 4.x available version.

How to use this image

The image launches Osmedeus' CLI tool without any arguments, so you have to provide your own to modify Osmedeus execution. Have a look at the inline help and the official documentation for basic and advanced usage examples.

This will show Osmedeus inline help:

$ docker run -it --rm mablanco/osmedeus

This will start an analysis on domain example.com with logs on the console and deleting the container after finishing:

$ docker run -it --rm mablanco/osmedeus osmedeus scan -t example.com

In case you want to persist the results of your analysis, you can create a volume for that purpose:

$ docker volume create osmedeus_workspaces
$ docker run -it --rm -v osmedeus_workspaces:/root/.osmedeus/workspaces mablanco/osmedeus osmedeus scan -t example.com

Web UI

You can start the Web UI, as a daemonized process, with the following command:

$ docker run -d --name osmedeus-server -p 8000:8000 mablanco/osmedeus osemdeus server

Now the Web UI is accesible at https://127.0.0.1:8000/. You can access an already existing volume containing Osmedeus workspaces adding the above volume parameters.

The password to access the Web UI can be obtained executing this command:

$ docker exec -it osmedeus-server grep password /root/.osmedeus/config.yaml | head -1

Building the image

Use the following command to build the image with the latest tag:

$ docker build -t mablanco/osmedeus .

In case you want to tag the image with a different version, use this command:

$ docker build -t mablanco/osmedeus:<release> .
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].