All Projects → aaaguirrep → offensive-docker-vps

aaaguirrep / offensive-docker-vps

Licence: MIT License
Create a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.

Programming Languages

HCL
1544 projects
HTML
75241 projects
Dockerfile
14818 projects

Projects that are alternatives of or similar to offensive-docker-vps

Cve 2016 8610 Poc
CVE-2016-8610 (SSL Death Alert) PoC
Stars: ✭ 26 (-60.61%)
Mutual labels:  pentesting, pentest, pentest-tool
vps
A laravel 5 package to easily create and maintain vps on digital ocean
Stars: ✭ 59 (-10.61%)
Mutual labels:  digitalocean, vps, digital-ocean
Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+1621.21%)
Mutual labels:  pentesting, pentest, pentest-tool
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+1074.24%)
Mutual labels:  pentesting, pentest, pentest-tool
Docker Security Images
🔐 Docker Container for Penetration Testing & Security
Stars: ✭ 172 (+160.61%)
Mutual labels:  pentesting, pentest, pentest-tool
Pwncat
pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)
Stars: ✭ 904 (+1269.7%)
Mutual labels:  pentesting, pentest, pentest-tool
Ssrf Testing
SSRF (Server Side Request Forgery) testing resources
Stars: ✭ 1,718 (+2503.03%)
Mutual labels:  pentesting, pentest, pentest-tool
Justtryharder
JustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)
Stars: ✭ 450 (+581.82%)
Mutual labels:  pentesting, pentest, pentest-tool
YAPS
Yet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-46.97%)
Mutual labels:  pentesting, pentest, pentest-tool
Trigmap
A wrapper for Nmap to quickly run network scans
Stars: ✭ 132 (+100%)
Mutual labels:  pentesting, pentest, pentest-tool
Habu
Hacking Toolkit
Stars: ✭ 635 (+862.12%)
Mutual labels:  pentesting, pentest, pentest-tool
Cloudbrute
Awesome cloud enumerator
Stars: ✭ 268 (+306.06%)
Mutual labels:  digitalocean, pentesting, pentest-tool
Thc Hydra
hydra
Stars: ✭ 5,645 (+8453.03%)
Mutual labels:  pentesting, pentest, pentest-tool
MailRipV3
SMTP and IMAP checker / cracker for mailpass combolists with a user-friendly GUI, automated inbox test and many more features.
Stars: ✭ 28 (-57.58%)
Mutual labels:  pentest, pentest-tool, pentesting-tools
Thc Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+618.18%)
Mutual labels:  pentesting, pentest, pentest-tool
Sippts
Set of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (+75.76%)
Mutual labels:  pentesting, pentest, pentest-tool
Kaboom
A tool to automate penetration tests
Stars: ✭ 322 (+387.88%)
Mutual labels:  pentesting, pentest, pentest-tool
Open Redirect Payloads
Open Redirect Payloads
Stars: ✭ 361 (+446.97%)
Mutual labels:  pentesting, pentest, pentest-tool
Jwtxploiter
A tool to test security of json web token
Stars: ✭ 130 (+96.97%)
Mutual labels:  pentesting, pentest, pentest-tool
Ccat
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Stars: ✭ 300 (+354.55%)
Mutual labels:  gcp, pentesting, pentest

Offensive Docker VPS

Create a VPS on Google Cloud Platform or Digital Ocean easily to use Offensive Docker and launch the assessments to the targets.

🎉🎉Digital Ocean Bonus🎉🎉 You can sign up with my referral link https://m.do.co/c/0d2d40f6a8a1 and get $100 free credit to try it out!

Table of contents

Requirements

  • Terraform installed (Version used: v0.13.4)
  • Ansible installed (Version used: 2.9.12)
  • SSH private and public keys
  • Google Cloud Platform or Digital Ocean account.

Usage

1.- Clone the repository

git clone --depth 1 https://github.com/aaaguirrep/offensive-docker-vps.git vps
cd vps

2.- Credentials

  • Create credentials folder.

    mkdir credentials
For Google Cloud Platform
  • Create a new project.
  • Create service account with "Compute Admin" role and download a key in json format in credentials folder.
  • Rename the key to gcp.json
  • Enable "Compute Engine API" for the project.
For Digital Ocean
  • Create a Personal access tokens with write permission and copy it. See Tutorial
SSH Private and Public keys
  • Inside credentials folder run ssh-keygen -t rsa -f offensive in the terminal. Empty passphrase is ok.
  • It creates two files: private and public key.

3.- Full Automation: Terraform and Ansible

Google Cloud Platform
  • Enter to gcp folder and modify the next value:
    • In main.tf file change the project value with your project-id.
  • Run the next commands:
# Initialize terraform provider
$ terraform init
Terraform has been successfully initialized!

# Create the resources
$ terraform apply -auto-approve
Apply complete! Resources: 6 added, 0 changed, 0 destroyed.
Outputs:
external_ip = x.x.x.x
  • Copy the external_ip value

Note: The instance type and the region used are: n1-standard-1 and us-central1. You can change the values on server.tf and main.tf

Demo asciicast

Digital Ocean
  • Enter to digital-ocean folder
  • With the personal access token copied run export TF_VAR_do_token="Personal_Access_Token_Here"
  • Run the next commands:
# Initialize terraform provider
$ terraform init
Terraform has been successfully initialized!

# Create the resources
$ terraform apply -auto-approve
Apply complete! Resources: 6 added, 0 changed, 0 destroyed.
Outputs:
external_ip = x.x.x.x
  • Copy the external_ip value

Note: The droplet type and the region used are: s-2vcpu-4gb and nyc3. You can change the values on server.tf and variables.tf

Demo asciicast

4.- Access to VPS

  • In gcp or digital-ocean folder run the next command. Change x.x.x.x by external_ip value copied.
# Access to VPS
$ ssh [email protected] -i ../credentials/offensive

Demo asciicast

5.- Destroy the VPS

  • In gcp or digital-ocean folder run the next command.
# Destroy the resource
$ terraform destroy -auto-approve

⚠️Note: For Digital Ocean, if you dont have a default VPC created in the region used it shows an error to destroy the VPC but no problem, it will destroy the others resources.

🛡️ Security

The service fail2ban has been installed to avoid brute force and block non-authorized users. 👻👻

Donations

Thanks for your donations, are always appreciated.

Buy me a coffee

Contributing

Contributing Guide

📈 Stargazers over time

Stargazers over time

License

MIT

Copyright (c) 2020, Arsenio Aguirre

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].