Dockerfile with advanced configurations for Offensive Docker.
- Provide the api keys, tokens, etc, for different offensive tools.
- gitrob
- gitGraber
- Amass
- findomain
- subfinder
- VPN alias for start VPN's profiles.
- Persistent history file.
- Docker service installed
Use the docker image by the next option:
git clone --depth 1 https://github.com/aaaguirrep/offensive-docker-custom.git offensive-docker
cd offensive-docker
# Copy and paste the tokens or api keys in the dockerfile and build the docker
docker build -t offensive-docker .
docker run --rm -it --name my-offensive-docker offensive-docker /bin/zsh
There are differents use cases for use the image and you should know how to run the container properly.
-
Use the container to access HTB (Hack the Box) machines by HTB vpn.
docker run --rm -it --cap-add=NET_ADMIN --device=/dev/net/tun --sysctl net.ipv6.conf.all.disable_ipv6=0 --name my-offensive-docker offensive-docker /bin/zsh
-
Share information from your local directory to container directory and save information on your local directory. You should save information under /offensive directory.
docker run --rm -it -v /path/to/local/directory:/offensive --name my-offensive-docker offensive-docker /bin/zsh
-
Mount directories by umount command.
docker run --rm -it --privileged --name my-offensive-docker offensive-docker /bin/zsh
The image was tested in the following environments:
-
Docker service for Mac: Docker version 19.03.5, build 633a0ea
-
Docker service for Linux instance on Google Cloud Platform: Docker version 19.03.6, build 369ce74a3c
-
Docker service for Linux droplet on Digital Ocean: Docker version 19.03.6, build 369ce74a3c
Thanks for your donations, are always appreciated.
While I drink the coffee I check more tools to add in the docker image.
Copyright (c) 2020, Arsenio Aguirre