Skip to content

Commit bc0499f

Browse files
committed
feat: update documentation
1 parent f77acc6 commit bc0499f

File tree

4 files changed

+51
-51
lines changed

4 files changed

+51
-51
lines changed

CONTRIBUTING.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Contributing to Pentest image
1+
# Contributing to Offensive Docker image
22

33
Want to contribute to docker image? We provide the next guide to help you get started.
44

README.md

Lines changed: 47 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -1,38 +1,38 @@
11
<!-- markdownlint-disable MD033 MD041 -->
22

33
<p align="center">
4-
<a href="https://hub.docker.com/r/aaaguirrep/pentest">
4+
<a href="https://hub.docker.com/r/aaaguirrep/offensive-docker">
55
<img
6-
alt="Docker for pentest"
6+
alt="Offensive Docker"
77
src="img/banner.jpg"
88
width="600"
99
/>
1010
</a>
1111
</p>
1212
<br/>
1313
<p align="center">
14-
<a href="https://github.com/aaaguirrep/pentest"><img alt="GitHub code size in bytes" src="https://img.shields.io/github/languages/code-size/aaaguirrep/pentest"></a>
15-
<a href="https://github.com/aaaguirrep/pentest"><img alt="GitHub repo size" src="https://img.shields.io/github/repo-size/aaaguirrep/pentest"></a>
16-
<a href="https://github.com/aaaguirrep/pentest"><img alt="GitHub last commit" src="https://img.shields.io/github/last-commit/aaaguirrep/pentest"></a>
17-
<a href="https://github.com/aaaguirrep/pentest"><img alt="GitHub issues" src="https://img.shields.io/github/issues/aaaguirrep/pentest"></a>
18-
<a href="https://github.com/aaaguirrep/pentest/graphs/contributors"><img alt="GitHub contributors" src="https://img.shields.io/github/contributors/aaaguirrep/pentest">
19-
<a href="https://github.com/aaaguirrep/pentest/blob/master/LICENSE"><img alt="GitHub" src="https://img.shields.io/github/license/aaaguirrep/pentest"></a>
14+
<a href="https://github.com/aaaguirrep/offensive-docker"><img alt="GitHub code size in bytes" src="https://img.shields.io/github/languages/code-size/aaaguirrep/offensive-docker"></a>
15+
<a href="https://github.com/aaaguirrep/offensive-docker"><img alt="GitHub repo size" src="https://img.shields.io/github/repo-size/aaaguirrep/offensive-docker"></a>
16+
<a href="https://github.com/aaaguirrep/offensive-docker"><img alt="GitHub last commit" src="https://img.shields.io/github/last-commit/aaaguirrep/offensive-docker"></a>
17+
<a href="https://github.com/aaaguirrep/offensive-docker"><img alt="GitHub issues" src="https://img.shields.io/github/issues/aaaguirrep/offensive-docker"></a>
18+
<a href="https://github.com/aaaguirrep/offensive-docker/graphs/contributors"><img alt="GitHub contributors" src="https://img.shields.io/github/contributors/aaaguirrep/offensive-docker">
19+
<a href="https://github.com/aaaguirrep/offensive-docker/blob/master/LICENSE"><img alt="GitHub" src="https://img.shields.io/github/license/aaaguirrep/offensive-docker"></a>
2020
</p>
2121
<p align="center">
22-
<a href="https://hub.docker.com/r/aaaguirrep/pentest"><img alt="Docker Cloud Build Status" src="https://img.shields.io/docker/cloud/build/aaaguirrep/pentest"></a>
23-
<a href="https://hub.docker.com/r/aaaguirrep/pentest"><img alt="Docker Automated build" src="https://img.shields.io/docker/automated/aaaguirrep/pentest"></a>
24-
<a href="https://hub.docker.com/r/aaaguirrep/pentest"><img alt="Docker Pulls" src="https://img.shields.io/docker/pulls/aaaguirrep/pentest"></a>
25-
<a href="https://hub.docker.com/r/aaaguirrep/pentest"><img alt="Docker Image Size (latest by date)" src="https://img.shields.io/docker/image-size/aaaguirrep/pentest"></a>
26-
<a href="https://hub.docker.com/r/aaaguirrep/pentest"><img alt="Docker Image Version (latest by date)" src="https://img.shields.io/docker/v/aaaguirrep/pentest"></a>
27-
<a href="https://hub.docker.com/r/aaaguirrep/pentest"><img alt="Docker Stars" src="https://img.shields.io/docker/stars/aaaguirrep/pentest"></a>
22+
<a href="https://hub.docker.com/r/aaaguirrep/offensive-docker"><img alt="Docker Cloud Build Status" src="https://img.shields.io/docker/cloud/build/aaaguirrep/offensive-docker"></a>
23+
<a href="https://hub.docker.com/r/aaaguirrep/offensive-docker"><img alt="Docker Automated build" src="https://img.shields.io/docker/automated/aaaguirrep/offensive-docker"></a>
24+
<a href="https://hub.docker.com/r/aaaguirrep/offensive-docker"><img alt="Docker Pulls" src="https://img.shields.io/docker/pulls/aaaguirrep/offensive-docker"></a>
25+
<a href="https://hub.docker.com/r/aaaguirrep/offensive-docker"><img alt="Docker Image Size (latest by date)" src="https://img.shields.io/docker/image-size/aaaguirrep/offensive-docker"></a>
26+
<a href="https://hub.docker.com/r/aaaguirrep/offensive-docker"><img alt="Docker Image Version (latest by date)" src="https://img.shields.io/docker/v/aaaguirrep/offensive-docker"></a>
27+
<a href="https://hub.docker.com/r/aaaguirrep/offensive-docker"><img alt="Docker Stars" src="https://img.shields.io/docker/stars/aaaguirrep/offensive-docker"></a>
2828
</p>
2929
<p align="center">
3030
<a href="https://discord.gg/2uBfu8E"><img alt="Discord" src="https://img.shields.io/discord/749093790676942888"></a>
3131
</p>
3232

33-
Docker for pentest is an image with the more used tools to create an pentest environment easily and quickly.
33+
Offensive Docker is an image with the more used tools to create an pentest environment easily and quickly.
3434

35-
:arrow_right: **Note:** Check out the next repo to know how to launch the docker for pentest in a VPS in Google Cloud Platform or Digital Ocean (free credit included). [VPS for docker for pentest](https://github.com/aaaguirrep/vps-docker-for-pentest)
35+
:arrow_right: **Note:** Check out the next repo to know how to launch offensive docker in a VPS in Google Cloud Platform or Digital Ocean (free credit included). [Offensive Docker VPS](https://github.com/aaaguirrep/offensive-docker-vps)
3636

3737
### Table of Contents
3838

@@ -43,7 +43,7 @@ Docker for pentest is an image with the more used tools to create an pentest env
4343
- [Operative system tools](#operative-system-tools)
4444
- [Network tools](#network-tools)
4545
- [Developer tools](#developer-tools)
46-
- [:hocho: Pentest tools](#hocho-pentest-tools)
46+
- [:hocho: Offensive tools](#hocho-offensive-tools)
4747
- [Port scanning](#port-scanning)
4848
- [:mag: Recon](#mag-recon)
4949
- [Subdomains](#subdomains)
@@ -94,8 +94,8 @@ Docker for pentest is an image with the more used tools to create an pentest env
9494

9595
- 🎬 Video: [Demos](https://asciinema.org/~aaaguirrep)
9696
- 💬 Chat: [Discord](https://discord.gg/2uBfu8E)
97-
- 🌟 [VPS Automation](https://github.com/aaaguirrep/vps-docker-for-pentest)
98-
- 👉 [Advanced configurations](https://github.com/aaaguirrep/docker-pentest-config)
97+
- 🌟 [VPS Automation](https://github.com/aaaguirrep/offensive-docker-vps)
98+
- 👉 [Advanced configurations](https://github.com/aaaguirrep/offensive-docker-custom)
9999

100100
## Features
101101

@@ -158,7 +158,7 @@ Docker for pentest is an image with the more used tools to create an pentest env
158158
- [tojson](https://github.com/tomnomnom/hacks/tree/master/tojson)
159159
- nodejs
160160

161-
### :hocho: Pentest tools
161+
### :hocho: Offensive tools
162162

163163
#### Port scanning
164164

@@ -328,7 +328,7 @@ Docker for pentest is an image with the more used tools to create an pentest env
328328

329329
#### Other resources
330330

331-
- [pentest-tools](https://github.com/gwen001/pentest-tools) from [@gwen001](https://github.com/gwen001)
331+
- [pentest-tools](https://github.com/gwen001/offensive-tools) from [@gwen001](https://github.com/gwen001)
332332
- [qsreplace](https://github.com/tomnomnom/qsreplace) from [@tomnomnom](https://github.com/tomnomnom)
333333

334334
### Custom functions
@@ -342,41 +342,41 @@ Docker for pentest is an image with the more used tools to create an pentest env
342342

343343
## :memo: Documentation
344344

345-
See the project's [wiki](https://github.com/aaaguirrep/pentest/wiki) for documentation.
345+
See the project's [wiki](https://github.com/aaaguirrep/offensive-docker/wiki) for documentation.
346346

347347
## :hammer_and_wrench: Usage
348348

349349
You can use the docker image by the next two options:
350350

351351
### Option 1 - Use the github repository
352352

353-
git clone --depth 1 https://github.com/aaaguirrep/pentest.git
354-
cd pentest
355-
docker build -t pentest .
356-
docker run --rm -it --name my-pentest pentest /bin/zsh
353+
git clone --depth 1 https://github.com/aaaguirrep/offensive-docker.git
354+
cd offensive-docker
355+
docker build -t offensive-docker .
356+
docker run --rm -it --name my-offensive-docker offensive-docker /bin/zsh
357357

358358
### Option 2 - Use the image from docker hub
359359

360-
Use image from docker hub: [aaaguirrep/pentest](https://hub.docker.com/r/aaaguirrep/pentest)
360+
Use image from docker hub: [aaaguirrep/offensive-docker](https://hub.docker.com/r/aaaguirrep/offensive-docker)
361361

362-
docker pull aaaguirrep/pentest
363-
docker run --rm -it --name my-pentest pentest /bin/zsh
362+
docker pull aaaguirrep/offensive-docker
363+
docker run --rm -it --name my-offensive-docker offensive-docker /bin/zsh
364364

365365
### Considerations to run the container
366366

367367
There are differents use cases for use the image and you should know how to run the container properly.
368368

369369
1. Use the container to access HTB (Hack the Box) machines by HTB vpn.
370370

371-
docker run --rm -it --cap-add=NET_ADMIN --device=/dev/net/tun --sysctl net.ipv6.conf.all.disable_ipv6=0 --name my-pentest aaaguirrep/pentest /bin/zsh
371+
docker run --rm -it --cap-add=NET_ADMIN --device=/dev/net/tun --sysctl net.ipv6.conf.all.disable_ipv6=0 --name my-offensive-docker aaaguirrep/offensive-docker /bin/zsh
372372

373-
2. Share information from your local directory to container directory and save information on your local directory. You should save information under /pentest directory.
373+
2. Share information from your local directory to container directory and save information on your local directory. You should save information under /offensive directory.
374374

375-
docker run --rm -it -v /path/to/local/directory:/pentest --name my-pentest aaaguirrep/pentest /bin/zsh
375+
docker run --rm -it -v /path/to/local/directory:/offensive --name my-offensive-docker aaaguirrep/offensive-docker /bin/zsh
376376

377377
3. Expose internal container services (apache, squid) for your local environment.
378378

379-
docker run --rm -it --name my-pentest -p 80:80 -p 3128:3128 aaaguirrep/pentest /bin/zsh
379+
docker run --rm -it --name my-offensive-docker -p 80:80 -p 3128:3128 aaaguirrep/offensive-docker /bin/zsh
380380

381381
Inside the container start apache2 and squid services by the aliases.
382382

@@ -385,7 +385,7 @@ There are differents use cases for use the image and you should know how to run
385385

386386
4. Mount directories by umount command.
387387

388-
docker run --rm -it --privileged --name my-pentest aaaguirrep/pentest /bin/zsh
388+
docker run --rm -it --privileged --name my-offensive-docker aaaguirrep/offensive-docker /bin/zsh
389389

390390
5. Tools are downloaded in /tools directory.
391391

@@ -395,48 +395,48 @@ You can set up the docker image with nice configurations like as:
395395

396396
### 1. Configure credentials in the docker
397397

398-
To use access keys, tokens or API Keys in the docker review the next repo [docker-pentest-config](https://github.com/aaaguirrep/docker-pentest-config)
398+
To use access keys, tokens or API Keys in the docker review the next repo [Offensive Docker Custom](https://github.com/aaaguirrep/offensive-docker-custom)
399399

400400
### 2. Alias to connect to HTB (Hack the Box) VPN
401401

402-
To use both options you should use -v option to map local directoty with /pentest container directory.
402+
To use both options you should use -v option to map local directoty with /offensive container directory.
403403

404404
#### Option 1 - HTB VPN using github repository
405405

406406
Add the next line in step "Create shorcuts" in Dockerfile, build a new image and run a new container with the -v option.
407407

408-
RUN echo "alias vpnhtb=\"openvpn /pentest/path/to/ovpn/file\"" >> /root/.zshrc
408+
RUN echo "alias vpnhtb=\"openvpn /offensive/path/to/ovpn/file\"" >> /root/.zshrc
409409

410410
#### Option 2 - HTB VPN using docker hub image
411411

412412
Create a new Dockerfile with the next steps, build a new image and run a new container with -v option.
413413

414-
FROM aaaguirrep/pentest
414+
FROM aaaguirrep/offensive-docker
415415

416416
# Create a shortcut and load the ovpn file from workstation
417-
RUN echo "alias vpnhtb=\"openvpn /pentest/path/to/ovpn/file\"" >> /root/.zshrc
417+
RUN echo "alias vpnhtb=\"openvpn /offensive/path/to/ovpn/file\"" >> /root/.zshrc
418418

419419
### 3. Save and load command history in your local environment
420420

421421
When you delete a container all information is deleted incluide command history. The next configuration provides you an option for save the command history in your local environment and load it when you run a new container. So, you wont lose your command history when run a new container.
422422

423-
To use both options you should use -v option to map local directoty with /pentest container directory.
423+
To use both options you should use -v option to map local directoty with /offensive container directory.
424424

425425
#### Option 1 - Command history using github repository
426426

427427
Add the next line in step "Create shorcuts" in Dockerfile, build a new image and run a new container.
428428

429429
# Save and load command history in your local environment
430-
RUN sed -i '1i export HISTFILE="/pentest/.zsh_history"' /root/.zshrc
430+
RUN sed -i '1i export HISTFILE="/history/.zsh_history"' /root/.zshrc
431431

432432
#### Option 2 - Command history using docker hub image
433433

434434
Create a new Dockerfile with the next steps, build a new image and run a new container.
435435

436-
FROM aaaguirrep/pentest
436+
FROM aaaguirrep/offensive-docker
437437

438438
# Save and load command history in your local environment
439-
RUN sed -i '1i export HISTFILE="/pentest/.zsh_history"' /root/.zshrc
439+
RUN sed -i '1i export HISTFILE="/history/.zsh_history"' /root/.zshrc
440440

441441
## :white_check_mark: Environment tested
442442

@@ -452,9 +452,9 @@ The image was tested in the following environments:
452452

453453
- Do not save information on container directories because it will be lost after delete the container, you should save information in your local environment using the parameter -v when you run the container. For instance:
454454

455-
docker run --rm -it -v /path/to/local/directory:/pentest --name my-pentest aaaguirrep/pentest /bin/zsh
455+
docker run --rm -it -v /path/to/local/directory:/offensive --name my-offensive-docker aaaguirrep/offensive-docker /bin/zsh
456456

457-
The above command specify a path local directory mapped with /pentest container directory. You should save all information under /pentest directory.
457+
The above command specify a path local directory mapped with /offensive container directory. You should save all information under /offensive directory.
458458

459459
- Use hashcat and john the ripper on controlled environments as CTF. You can experiment issues.
460460

@@ -468,15 +468,15 @@ While I drink the coffee I check more tools to add in the docker image.
468468

469469
## Contributors
470470

471-
Thank you to all our [contributors](https://github.com/aaaguirrep/pentest/graphs/contributors)!
471+
Thank you to all our [contributors](https://github.com/aaaguirrep/offensive-docker/graphs/contributors)!
472472

473473
## Contributing
474474

475475
[Contributing Guide](CONTRIBUTING.md)
476476

477477
## :chart_with_upwards_trend: Stargazers over time
478478

479-
[![Stargazers over time](https://starchart.cc/aaaguirrep/pentest.svg)](https://starchart.cc/aaaguirrep/pentest)
479+
[![Stargazers over time](https://starchart.cc/aaaguirrep/offensive-docker.svg)](https://starchart.cc/aaaguirrep/offensive-docker)
480480

481481
## License
482482

img/banner.jpg

-43.7 KB
Loading

shell/banner

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,11 @@ yellowColour="\e[0;33m\033[1m"
88
grayColour="\e[0;37m\033[1m"
99
# Banner
1010
echo "\t${greenColour}************************************************************************************${yellowColour}"
11-
figlet -c -w 100 Docker for pentest
11+
figlet -c -w 100 Offensive Docker
1212
echo "\t${redColour}Version: ${blueColour}$VERSION${endColour}"
1313
echo "\t${greenColour}------------------------------------------------------------------------------------"
1414
echo "\t${redColour}Creator: ${blueColour}Arsenio Aguirre\t\t\t${redColour}Email: ${blueColour}[email protected]"
1515
echo "\t${grayColour}Repositories links:"
16-
echo "\t${redColour}Docker Hub: ${blueColour}https://hub.docker.com/r/aaaguirrep/pentest"
17-
echo "\t${redColour}Github: ${blueColour}https://github.com/aaaguirrep/pentest"
16+
echo "\t${redColour}Docker Hub: ${blueColour}https://hub.docker.com/r/aaaguirrep/offensive-docker"
17+
echo "\t${redColour}Github: ${blueColour}https://github.com/aaaguirrep/offensive-docker"
1818
echo "\t${greenColour}************************************************************************************"

0 commit comments

Comments
 (0)