Docker for pentest: Environment for pentest easily and quickly

Docker for pentest is an image with the most used tools to create a pentest (penetration testing) environment easily and quickly.


  • Installed OS, networking, development and pentest tools.
  • Connect to HTB (Hack the Box) vpn for access to HTB machines.
  • Popular wordlists installed: SecLists, dirb, dirbuster, fuzzdb, wfuzz and rockyou.
  • Proxy service for sending traffic from any browser and burp suite.
  • Installed on your local drive.
  • Installed database.
  • Tool for breaking passwords.
  • Linux enumeration tools installed.
  • Tools installed on tracking services that work.
  • Tools installed in the fuzzing directory.
  • Monitor linux processes without root privileges
  • Zsh shell installation.

Installed tools

Operative system tools

  •  rdate
  • vim
  • zsh
  • oh-my-zsh
  • locate
  • cifs-utils
  • htop
  • gottop

Network tools

  • traceroute
  • telnet
  • net-tools
  • iputils-ping
  • Tcpdump
  • openvpn
  • whois
  • host
  • prips
  • you

developer tools

  • git
  • curl
  • wget
  • ruby
  • go
  • python
  • python pip
  • python3
  • python3-pip
  • php
  • aws-cli
  • tojson
  • nodejs

? Pentest tools

Port scanning

? Recon


Git repositories


Brute force


OS Enumeration



reverse shell

other resources

Custom functions

Other services

  • apache2
  • squid

Information on installing and using the program, you will find here. The Best Technology Site in Greecefgns

Subscribe to Blog by Email

Subscribe to this blog and receive notifications of new posts by email.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).