These docker images serve as a base image for Penetration Testing and Red Teaming. I have pre-installed several useful tools that I use day to day on engagements.
All terminal output will be logged to ~/.logs/ with date and timestamps. If there are any other tools that the community finds useful or want included feel free to submit a pull request.
Thanks to all the developers that put the time and effort into the tools in this container!
# For arm based deployments:
docker run -it n0pesled/bastion:armv8
# For x86/x64 based deployments:
docker run -it n0pesled/bastion:amd64
~ > cat /etc/os-release root@797dfc5b7506 11:15:09 PM
PRETTY_NAME="Debian GNU/Linux 12 (bookworm)"
NAME="Debian GNU/Linux"
VERSION_ID="12"
VERSION="12 (bookworm)"
VERSION_CODENAME=bookworm
ID=debian
HOME_URL="https://www.debian.org/"
SUPPORT_URL="https://www.debian.org/support"
BUG_REPORT_URL="https://bugs.debian.org/"
- Go
- Java
- NodeJS
- Perl
- Powershell 7
- Python 3
- Rust
- openvpn
- wget
- python3
- python3-pip
- python3-venv
- pipx
- libkrb5-dev
- krb5-config
- curl
- gpg
- unzip
- git
- jq
- dnsutils
- nano
- net-tools
- ldap-utils
- libssl-dev
- screen
- nmap
- make
- build-essential
- unzip
- locate
- default-jdk
- tmux
- docker.io
- proxychains-ng
- tcpdump
- zsh
- GCloud
- AWS
- Azure
- Powershell
- GCloud
- Metasploit
- dirsearch
- dnsrecon
- impacket
- bloodhound.py
- sqlmap
- certipy-ad
- Coercer
- pyldapsearch
- pysqlrecon
- spraycharles
- PMapper
- ScoutSuite
- trevorspray
- trevorproxy
- certi
- enum4linux-ng
- recon-ng
- PetitPotam
- pre2k
- pywhisker
- PKINITtools
- sccmhunter
- wmiexec-Pro
- bf-aws-perms-simulate
- bf-aws-permissions
- ysoserial
- godap
- ldapper
- kerbrute
- TeamsUserEnum
- cloudfox
- nikto
- mikto
- PowerSploit
- MicroBurst
- BARK