├── Dockerfile └── README.md /Dockerfile: -------------------------------------------------------------------------------- 1 | FROM ubuntu:latest 2 | MAINTAINER Veerendra.Kakumanu 3 | RUN apt-get update -y && \ 4 | apt-get install -y vim python-dev net-tools conntrack traceroute inetutils-ping libcap* tcpdump python python-pip zlib1g zlib1g-dev build-essential wget xz-utils libcap* sudo debconf-utils kmod && \ 5 | pip install scapy && \ 6 | pip install --upgrade pip && \ 7 | echo "kismet kismet/install-setuid select true" | sudo debconf-set-selections && \ 8 | echo "kismet kismet/install-users string root" | sudo debconf-set-selections && \ 9 | apt-get install -y ettercap-text-only kismet aircrack-ng nmap yersinia dsniff dnsmasq hostapd 10 | ADD https://raw.githubusercontent.com/veerendra2/wifi-deauth-attack/master/deauth.py /opt/deauth.py 11 | ADD http://scrapmaker.com/data/wordlists/dictionaries/rockyou.txt /opt/rockyou.txt 12 | CMD ["/bin/bash"] 13 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | ![Docker Stars](https://img.shields.io/docker/stars/veerendrav2/hacker-tools.svg?style=for-the-badge) 2 | ![GitHub stars](https://img.shields.io/github/stars/veerendra2/hacker-tools.svg?style=for-the-badge) 3 | ![Docker Pulls](https://img.shields.io/docker/pulls/veerendrav2/hacker-tools.svg?style=for-the-badge) 4 | ![MicroBadger Size (tag)](https://img.shields.io/microbadger/image-size/veerendrav2/hacker-tools/latest.svg?style=for-the-badge) 5 | 6 | # Hacker Tools Dockerfile 7 | This repository is meant to build the base image for a Hacker Tools container. 8 | 9 | #### Tools included in this image. 10 | 11 | | | Tools | 12 | |:---------|:-----------------| 13 | |0 | [Automated Wifi-Deauth script](https://github.com/veerendra2/wifi-deauth-attack) (Python Script in `/opt/`) 14 | | 1 |[macof](http://manpages.ubuntu.com/manpages/xenial/man8/macof.8.html)| 15 | |2| [yersinia](http://manpages.ubuntu.com/manpages/trusty/man8/yersinia.8.html)| 16 | |3|[kismet](http://manpages.ubuntu.com/manpages/precise/man1/kismet.1.html)| 17 | |4 |[nmap](http://manpages.ubuntu.com/manpages/xenial/man1/nmap.1.html)| 18 | |5 |[dsniff](http://manpages.ubuntu.com/manpages/precise/man8/arpspoof.8.html)| 19 | |6 |[dnsmaq](http://manpages.ubuntu.com/manpages/trusty/man8/dnsmasq.8.html)| 20 | |7 |[hostapd](http://manpages.ubuntu.com/manpages/trusty/man8/hostapd.8.html)| 21 | |8 |[ettercap](http://manpages.ubuntu.com/manpages/trusty/man8/ettercap.8.html)| 22 | |9 |[conntrack](http://manpages.ubuntu.com/manpages/trusty/man8/conntrack.8.html)| 23 | |10 |[traceroute](http://manpages.ubuntu.com/manpages/trusty/man1/traceroute.db.1.html)| 24 | |11 |[tcpdump](http://manpages.ubuntu.com/manpages/trusty/man8/tcpdump.8.html)| 25 | |12 |[scapy](http://www.secdev.org/projects/scapy/doc/)| 26 | |13 |[airmon-ng](https://www.aircrack-ng.org/documentation.html) (with password dictionary `rockyou.txt` in `/opt/`)| 27 | |14|[ping](http://manpages.ubuntu.com/manpages/trusty/man8/ping.8.html)| 28 | 29 | 30 | #### Pull the Image 31 | ###### `docker pull veerendrav2/hacker-tools` 32 | 33 | #### Run the Container 34 | ###### `docker run -it -d --net=host --privileged --name little-boy veerendrav2/hacker-tools` 35 | 36 | ### NOTE: 37 | ##### Must run the container with `--net=host --privileged` option. Then only you can capture the packets and monitor the network on physical interface(Example: `wlan0`) 38 | --------------------------------------------------------------------------------