Nightingale: A comprehensive Dockerized environment tailored for penetration testing and vulnerability assessment
Docker for Pentesters
Docker containerization is the most powerful technology in the current market so I came up with the idea to develop Docker images for Pentesters.
Nightingale contains all the required well-known tools that will be required for the Pentesters at the time of Penetration Testing. This docker image has the base support of Debian and it is completely platform Independent.
You can either create a docker image in your localhost machine by modifying it according to your requirements or you can directly pull the docker image from the docker hub itself.
Pros
- No need to install multiple programming language supports and modules.
- The booting process is very fast due to the virtualization concept.
- Uses resources from the host machine as needed.
- All pre-installed tools are ready, and you can install new software or tools if required.
- You can perform vulnerability assessments and penetration testing on any scope.
- You can access this Docker container via a browser by calling your local address.
Why?
The Reason behind creating this Docker file is to make a platform-independent penetration toolkit. It includes all the useful tools that will be required for a penetration tester (You can refer to the tool list section for the same).
Device Requirements
- Operating System: Windows, Mac, Linux
- Docker engine installed as per the Operating System
Tools Category
- Operating System tools (Windows, Mac, Linux)
- Compression tools (7zip, tar, zip)
- Development Essentials (Git, GitLab, etc)
- Programming Languages support (Python, Ruby, Java, etc)
- Exploit Frameworks (Metasploit, Exploit-DB, etc)
- Port Scanning Tools (nmap, etc)
- Network tools (Tcpdump, etc)
- Forensic tools (exiftool,steghide, binwalk, foremost, etc)
- Red Team Tools (Metasploit, etc)
- Information Gathering tools
Install & Use
Copyright (C) 2022 RAJANAGORI