Docker for pentest: Environment for pentest easily and quickly

Docker for pentest is an image with the most used tools to create a pentest (penetration testing) environment easily and quickly.

Specifications

  • Installed OS, networking, development and pentest tools.
  • Connect to HTB (Hack the Box) vpn for access to HTB machines.
  • Popular wordlists installed: SecLists, dirb, dirbuster, fuzzdb, wfuzz and rockyou.
  • Proxy server service for sending traffic from anyone and burp suite.
  • Installed on your local drive.
  • Installed database.
  • Tool for breaking passwords.
  • Linux enumeration tools installed.
  • Tools installed on tracking services that work.
  • Tools installed in the fuzzing directory.
  • Monitor linux processes without root privileges
  • Zsh shell installation.

Installed tools

operative tools

  •  rdate
  • vim
  • zsh
  • oh-my-zsh
  • locate
  • cifs-utils
  • htop
  • gottop

tools

  • traceroute
  • telnet
  • net-tools
  • iputils-ping
  • Tcpdump
  • openvpn
  • whois
  • host
  • prips
  • you

developer tools

  • git
  • curl
  • wget
  • ruby
  • go
  • python
  • python pip
  • python3
  • python3-pip
  • php
  • aws-cli
  • tojson
  • nodejs

? Pentest tools

Port scanning

? Recon

wordlist

Git repositories

OWASP

Brute force

cracking

OS Enumeration

exploits

Windows

reverse shell

other resources

Custom functions

Other services

  • apache2
  • squid

Information about the installation and use of the pretos, you will find here.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).