All Projects → aaaguirrep → Offensive Docker

aaaguirrep / Offensive Docker

Licence: mit
Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.

Projects that are alternatives of or similar to Offensive Docker

Security Tools
Collection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+55.18%)
Mutual labels:  hacking, pentesting, ctf-tools, bugbounty, bug-bounty
Spellbook
Micro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-83.84%)
Mutual labels:  hacking, pentesting, ctf-tools, bug-bounty
Pidrila
Python Interactive Deepweb-oriented Rapid Intelligent Link Analyzer
Stars: ✭ 125 (-61.89%)
Mutual labels:  hacking, pentesting, pentest, bug-bounty
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+2109.15%)
Mutual labels:  hacking, pentesting, bug-bounty, bugbounty
YAPS
Yet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-89.33%)
Mutual labels:  pentesting, bugbounty, pentest, ctf-tools
tugarecon
Pentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (-56.71%)
Mutual labels:  bug-bounty, bugbounty, pentest
flydns
Related subdomains finder
Stars: ✭ 29 (-91.16%)
Mutual labels:  bug-bounty, bugbounty, pentest
Findom Xss
A fast DOM based XSS vulnerability scanner with simplicity.
Stars: ✭ 310 (-5.49%)
Mutual labels:  pentesting, pentest, bugbounty
aquatone
A Tool for Domain Flyovers
Stars: ✭ 43 (-86.89%)
Mutual labels:  bug-bounty, bugbounty, pentest
Awesome Bbht
A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (-42.07%)
Mutual labels:  hacking, bugbounty, bug-bounty
lit-bb-hack-tools
Little Bug Bounty & Hacking Tools⚔️
Stars: ✭ 180 (-45.12%)
Mutual labels:  bug-bounty, bugbounty, ctf-tools
Xxe Injection Payload List
🎯 XML External Entity (XXE) Injection Payload List
Stars: ✭ 304 (-7.32%)
Mutual labels:  hacking, bugbounty, bug-bounty
Capsulecorp Pentest
Vagrant VirtualBox environment for conducting an internal network penetration test
Stars: ✭ 214 (-34.76%)
Mutual labels:  hacking, pentesting, pentest
Onelistforall
Rockyou for web fuzzing
Stars: ✭ 213 (-35.06%)
Mutual labels:  hacking, pentesting, bugbounty
Whatweb
Next generation web scanner
Stars: ✭ 3,503 (+967.99%)
Mutual labels:  hacking, pentesting, pentest
Hawkeye
Hawkeye filesystem analysis tool
Stars: ✭ 202 (-38.41%)
Mutual labels:  hacking, pentesting, bug-bounty
Nightingale
It's a Docker Environment for pentesting which having all the required tool for VAPT.
Stars: ✭ 119 (-63.72%)
Mutual labels:  bug-bounty, bugbounty, ctf-tools
Vajra
Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (-17.99%)
Mutual labels:  hacking, pentesting, bug-bounty
sub404
A python tool to check subdomain takeover vulnerability
Stars: ✭ 205 (-37.5%)
Mutual labels:  bug-bounty, pentesting, bugbounty
Dumpall
一款信息泄漏利用工具,适用于.git/.svn源代码泄漏和.DS_Store泄漏
Stars: ✭ 250 (-23.78%)
Mutual labels:  hacking, pentesting, bug-bounty

Offensive Docker


GitHub code size in bytes GitHub repo size GitHub last commit GitHub issues GitHub contributors GitHub

Docker Cloud Build Status Docker Automated build Docker Pulls Docker Image Size (latest by date) Docker Image Version (latest by date) Docker Stars

Discord

Offensive Docker is an image with the more used tools to create an pentest environment easily and quickly.

➡️ Note: Check out the next repo to know how to launch offensive docker in a VPS in Google Cloud Platform or Digital Ocean (free credit included). Offensive Docker VPS

Table of Contents

Links

Features

  • OS, networking, developing and pentesting tools installed.
  • Connection to HTB (Hack the Box) vpn to access HTB machines.
  • Popular wordlists installed: SecLists, dirb, dirbuster, fuzzdb, wfuzz and rockyou.
  • Proxy service to send traffic from any browsers and burp suite installed in your local directory.
  • Exploit database installed.
  • Tool for cracking password.
  • Linux enumeration tools installed.
  • Tools installed to discovery services running.
  • Tools installed to directory fuzzing.
  • Monitor for linux processes without root permissions
  • Zsh shell installed.

Requirements

  • Docker service installed

Tools installed

Operative system tools

  • rdate
  • vim
  • zsh
  • oh-my-zsh
  • locate
  • cifs-utils
  • htop
  • tree
  • gotop
  • fcrackzip

Network tools

  • traceroute
  • telnet
  • net-tools
  • iputils-ping
  • tcpdump
  • openvpn
  • whois
  • host
  • prips
  • dig

Developer tools

  • git
  • curl
  • wget
  • ruby
  • go
  • python
  • python-pip
  • python3
  • python3-pip
  • php
  • aws-cli
  • tojson
  • nodejs

🔪 Offensive tools

Port scanning

🔍 Recon

Subdomains
Subdomain takeover
DNS Lookups
📷 Screenshot
🕸 Crawler
📁 Search directories
Fuzzer
Web Scanning
CMS
Search JS

Wordlist

Git repositories

OWASP

📱 Mobile

Brute force

Cracking

OS Enumeration

Exploits

Windows

Reverse shell

Other resources

Forensic

Custom functions

Other services

  • apache2
  • squid
  • ssh
  • rsyslog

Reporting tools

  • Latex

📝 Documentation

See the project's wiki for documentation.

🛠 Usage

You can use the docker image by the next two options:

Option 1 - Use the github repository

git clone --depth 1 https://github.com/aaaguirrep/offensive-docker.git
cd offensive-docker
docker build -t offensive-docker .
docker run --rm -it --name my-offensive-docker offensive-docker /bin/zsh

Option 2 - Use the image from docker hub

Use image from docker hub: aaaguirrep/offensive-docker

docker pull aaaguirrep/offensive-docker
docker run --rm -it --name my-offensive-docker aaaguirrep/offensive-docker /bin/zsh

Considerations to run the container

There are differents use cases for use the image and you should know how to run the container properly.

  1. Use the container to access HTB (Hack the Box) machines by HTB vpn.

     docker run --rm -it --cap-add=NET_ADMIN --device=/dev/net/tun --sysctl net.ipv6.conf.all.disable_ipv6=0 --name my-offensive-docker aaaguirrep/offensive-docker /bin/zsh
    
  2. Share information from your local directory to container directory and save information on your local directory. You should save information under /offensive directory.

     docker run --rm -it -v /path/to/local/directory:/offensive --name my-offensive-docker aaaguirrep/offensive-docker /bin/zsh
    
  3. Expose internal container services (apache, squid) for your local environment.

     docker run --rm -it --name my-offensive-docker -p 80:80 -p 3128:3128 aaaguirrep/offensive-docker /bin/zsh
    

    Inside the container start apache2 and squid services by the aliases.

     apacheUp
     squidUp
    
  4. Mount directories by umount command.

     docker run --rm -it --privileged --name my-offensive-docker aaaguirrep/offensive-docker /bin/zsh
    
  5. Tools are downloaded in /tools directory.

⚙️ Nice configurations

You can set up the docker image with nice configurations like as:

1. Configure credentials in the docker

To use access keys, tokens or API Keys in the docker review the next repo Offensive Docker Custom

2. Alias to connect to HTB (Hack the Box) VPN

To use both options you should use -v option to map local directoty with /offensive container directory.

Option 1 - HTB VPN using github repository

Add the next line in step "Create shorcuts" in Dockerfile, build a new image and run a new container with the -v option.

RUN echo "alias vpnhtb=\"openvpn /offensive/path/to/ovpn/file\"" >> /root/.zshrc

Option 2 - HTB VPN using docker hub image

Create a new Dockerfile with the next steps, build a new image and run a new container with -v option.

FROM aaaguirrep/offensive-docker

# Create a shortcut and load the ovpn file from workstation
RUN echo "alias vpnhtb=\"openvpn /offensive/path/to/ovpn/file\"" >> /root/.zshrc

3. Save and load command history in your local environment

When you delete a container all information is deleted incluide command history. The next configuration provides you an option for save the command history in your local environment and load it when you run a new container. So, you wont lose your command history when run a new container.

To use both options you should use -v option to map local directoty with /offensive container directory.

Option 1 - Command history using github repository

Add the next line in step "Create shorcuts" in Dockerfile, build a new image and run a new container.

# Save and load command history in your local environment
RUN sed -i '1i export HISTFILE="/history/.zsh_history"' /root/.zshrc

Option 2 - Command history using docker hub image

Create a new Dockerfile with the next steps, build a new image and run a new container.

FROM aaaguirrep/offensive-docker

# Save and load command history in your local environment
RUN sed -i '1i export HISTFILE="/history/.zsh_history"' /root/.zshrc

✅ Environment tested

The image was tested in the following environments:

  • Docker service for Mac Docker version 19.03.13, build 4484c46d9d

  • Docker service for Linux instance on Google Cloud Platform Docker version 19.03.6, build 369ce74a3c

  • Docker service for Linux droplet on Digital Ocean Docker version 19.03.6, build 369ce74a3c

⚠️ Warning

  • Do not save information on container directories because it will be lost after delete the container, you should save information in your local environment using the parameter -v when you run the container. For instance:

    docker run --rm -it -v /path/to/local/directory:/offensive --name my-offensive-docker aaaguirrep/offensive-docker /bin/zsh
    

    The above command specify a path local directory mapped with /offensive container directory. You should save all information under /offensive directory.

  • Use hashcat and john the ripper on controlled environments as CTF. You can experiment issues.

☕️ Donations

Thanks for your donations, are always appreciated.

While I drink the coffee I check more tools to add in the docker image.

Buy me a coffee

Contributors

Thank you to all our contributors!

Contributing

Contributing Guide

📈 Stargazers over time

Stargazers over time

License

MIT

Copyright (c) 2020, Arsenio Aguirre

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].