-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathpentest.dockerlist.json
More file actions
1 lines (1 loc) · 5.99 KB
/
pentest.dockerlist.json
File metadata and controls
1 lines (1 loc) · 5.99 KB
1
{"dockeritems": {"jwt_tool": ["A tool for hacking JWT", "docker run -it --network \"host\" --rm -v \"${PWD}:/tmp\" -v \"${HOME}/.jwt_tool:/root/.jwt_tool\" ticarpi/jwt_tool", "-h; PWD mapped to /tmp", ["DockerHub", "ticarpi/jwt_tool"], {}, 1770806063, "tool"], "cme": ["AKA CrackMapExec: An AD pentesting tool - SMB/LDAP/MSSQL/etc.", "docker run -it --rm --name crackmapexec -v \"${HOME}/.cme:/root/.cme\" -v \"${PWD}:/tmp\" byt3bl33d3r/crackmapexec", "-h; PWD mapped to /tmp", ["DockerHub", "byt3bl33d3r/crackmapexec"], {}, "", "tool"], "cmedb": ["The CrackMapExec database for creds and other ouput from the tool", "docker run -it --rm --name crackmapexec -v \"${HOME}/.cme:/root/.cme\" -v \"${PWD}:/tmp\" --entrypoint=/usr/local/bin/cmedb byt3bl33d3r/crackmapexec", "-h; PWD mapped to /tmp", ["None", "byt3bl33d3r/crackmapexec"], {}, "", "tool"], "impacket": ["The Impacket toolkit for internal pentesting", "docker run -it --rm -p 445:445 -p 80:80 -p 443:443 -v \"${PWD}:/tmp\" -w /opt/impacket/examples impacket", "-h;examples/ directory is at /opt/impacket/examples/", ["GitHub", "impacket", "https://www.github.com/SecureAuthCorp/impacket"], {"Dockerfile": "RlJPTSBweXRob246My44LWFscGluZSBhcyBjb21waWxlCldPUktESVIgL29wdApSVU4gYXBrIGFkZCAtLW5vLWNhY2hlIGdpdCBnY2MgbXVzbC1kZXYgcHl0aG9uMy1kZXYgbGliZmZpLWRldiBvcGVuc3NsLWRldiBjYXJnbwpBREQgLiAvb3B0L2ltcGFja2V0CldPUktESVIgL29wdC9pbXBhY2tldApSVU4gcHl0aG9uMyAtbSBwaXAgaW5zdGFsbCAtciByZXF1aXJlbWVudHMudHh0ClJVTiBweXRob24zIHNldHVwLnB5IGluc3RhbGwKV09SS0RJUiAvb3B0L2ltcGFja2V0L2V4YW1wbGVzCkVOVFJZUE9JTlQgWyJweXRob24zIl0="}, "", "tool"], "responder": ["Responder.py - a tool for replaying and relaying hashes on a variety of services for internal pentesting", "docker run -it --rm --network host responder", "-h;LM Challenge already set for the https://crack.sh rainbow tables", ["GitHub", "responder", "https://www.github.com/lgandx/Responder"], {"Dockerfile": "RlJPTSBweXRob246My44LWFscGluZQpXT1JLRElSIC9vcHQKQ09QWSAuIC9vcHQvUmVzcG9uZGVyCldPUktESVIgL29wdC9SZXNwb25kZXIKUlVOIHNlZCAicy9DaGFsbGVuZ2UgPSBSYW5kb20vQ2hhbGxlbmdlID0gMTEyMjMzNDQ1NTY2Nzc4OC8iIFJlc3BvbmRlci5jb25mIC1pClJVTiBhcGsgYWRkIC0tbm8tY2FjaGUgZ2l0IGdjYyBtdXNsLWRldiBweXRob24zLWRldiBsaWJmZmktZGV2IG9wZW5zc2wtZGV2IGNhcmdvClJVTiBweXRob24zIC1tIHBpcCBpbnN0YWxsIC1yIHJlcXVpcmVtZW50cy50eHQKRU5UUllQT0lOVCBbInB5dGhvbjMiLCJSZXNwb25kZXIucHkiXQ=="}, "", "tool"], "nmap": ["Network port scanner", "docker run -it --rm --name nmap secsi/nmap", "-h", ["DockerHub", "secsi/nmap"], {}, "", "tool"], "ffuf": ["Web directory fuzzer, scanner, brute-forcer", "docker run -it --rm --name ffuf -v \"${PWD}:/tmp\" ffuf -c", "-h Seclists is at: /opt/SecLists/; -w /opt/SecLists/Discovery/Web-Content/raft-{small/medium/large}-{files/words/directories}.txt; -u https://example.com/FUZZ; Filter/Match: -fc/-mc (status code), -fs/-ms (size), -fr/-mr (regex); -c (colourise output); -of csv -o /tmp/ffuf.csv; curl-like: -X GET, -H \"Header: here\", -r (follow redirects), -x http://localhost:8080", ["Dockerfile", "ffuf"], {"Dockerfile": "RlJPTSBnb2xhbmc6MS4yMQoKV09SS0RJUiAvb3B0ClJVTiBnaXQgY2xvbmUgaHR0cHM6Ly9naXRodWIuY29tL2RhbmllbG1pZXNzbGVyL1NlY0xpc3RzCgpXT1JLRElSIC9nbwpSVU4gZ2l0IGNsb25lIGh0dHBzOi8vZ2l0aHViLmNvbS9mZnVmL2ZmdWYKCldPUktESVIgL2dvL2ZmdWYKUlVOIGdvIGJ1aWxkIC12IC1vIC91c3IvbG9jYWwvYmluL2ZmdWYKCkVOVFJZUE9JTlQgWyJmZnVmIl0KCgo="}, 1698270630, "tool"], "graphql-playground": ["GraphQL IDE for better development workflows (GraphQL Subscriptions, interactive docs & collaboration)", "docker run --rm --name graphql-playground -p 9090:8080 mkrou/graphql-playground-docker", "-h", ["DockerHub", "mkrou/graphql-playground-docker"], {}, "", "tool"], "nikto": ["Web configuration vulnerability scanner", "docker run -it --rm --name nikto -v \"${PWD}:/tmp\" nikto", "-h; PWD mapped to /tmp; -host example.com -port 443 -ssl -output /tmp/nikto.xml", ["GitHub", "nikto", "https://www.github.com/sullo/nikto"], {}, "", "tool"], "sqlmap": ["SQL Injection scanner", "docker run -it --rm --name sqlmap secsi/sqlmap", "-h", ["DockerHub", "secsi/sqlmap"], {}, "", "tool"], "testssl": ["SSL/TLS config scanner", "docker run --rm -ti -v \"${PWD}:/tmp\" -w /tmp drwetter/testssl.sh --html --json", "--help; PWD mapped to /tmp; target should be HOSTNAME:PORT and be the last parameter", ["DockerHub", "drwetter/testssl.sh"], {}, "", "tool"], "kiterunner": ["KiteRunner - a scanner for APIs", "docker run --rm -it --name kiterunner -v \"${PWD}:/tmp\" darkmagex6/kiterunner", "-h; scan - is main function for APIs when using the kiterunner prebuilt lists; -w routes-large.kite -x 20 -j 100", ["DockerHub", "darkmagex6/kiterunner"], {}, 1698417304, "tool"], "smbhere": ["SMB server running on the current directory", "docker run -it --rm --name smbhere -m 512m -p 139:139 -p 445:445 -v \"${PWD}:/mount\" dperson/samba -p -s \"share;/mount;yes;no;yes\"", "", ["DockerHub", "dperson/samba"], {}, "", "service"], "nginxhere": ["NGINX server running web content from the current directory", "docker run -it --rm -p 9090:80 --name nginxhere -v \"${PWD}:/usr/share/nginx/html\" nginx", "", ["DockerHub", "nginx"], {}, "", "service"], "webdavhere": ["WebDav server running on the current directory", "docker run --rm -it --name webdavhere -p 9090:80 -v \"${PWD}:/srv/data/share\" rflathers/webdav", "upload from curl: `curl -X PUT -T test.txt http://localhost:9090/share/test.txt`; upload from Windows: `net use x: \\\\localhost@9090\\share`", ["DockerHub", "rflathers/webdav"], {}, "", "service"], "phphere": ["PHP server running in current directory", "docker run -it --rm -p 9090:80 --name phphere -v \"${PWD}:/var/www/html\" php:7.4-apache", "", ["DockerHub", "php:7.4-apache"], {}, "", "service"], "ubuntu": ["Ubuntu 22:04 (LTS: patched)", "docker run -it --rm --name ubuntu -v \"${PWD}:/tmp\" -w /tmp ubuntu:22.04", "PWD mapped to /tmp", ["DockerHub", "ubuntu:22.04"], {}, "", "environment"], "ngrok9090here": ["ngrok running a web-accessible proxy of localhost:9090", "docker run -it --rm --name ngrok --net=\"host\" -e NGROK_AUTHTOKEN=ADD_YOUR_AUTH_TOKEN_HERE ngrok/ngrok:alpine http host.docker.internal:9090", "", ["DockerHub", "ngrok/ngrok"], {}, "", "service"]}}