Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/RAJANAGORI/Nightingale

It's a Docker Environment for Pentesting which having all the required tool for VAPT.
https://github.com/RAJANAGORI/Nightingale

bugbounty cybersecurity docker-image hacking hacking-tools htb nightingale osint owasp penetration-testing pentest-tool pentesting platform-independent vulnerabilities

Last synced: 21 days ago
JSON representation

It's a Docker Environment for Pentesting which having all the required tool for VAPT.

Awesome Lists containing this project

README

        

# Docker for Pentesters

![Nightingale Logo](https://raw.githubusercontent.com/OWASP/www-project-nightingale/main/assets/images/Nightingale.png)

[![OWASP Incubator](https://img.shields.io/badge/owasp-incubator-blue.svg)](https://www.owasp.org/index.php/Category:OWASP_Project#tab=Project_Inventory)
[![Docker Image CI](https://github.com/RAJANAGORI/Nightingale/actions/workflows/docker-image.yaml/badge.svg)](https://github.com/RAJANAGORI/Nightingale/actions/workflows/docker-image.yaml)
[![Multi OS docker images - arm64 MAC OS](https://github.com/RAJANAGORI/Nightingale/actions/workflows/multi-os-arm64.yaml/badge.svg)](https://github.com/RAJANAGORI/Nightingale/actions/workflows/multi-os-arm64.yaml)
[![Trivy Scan](https://github.com/RAJANAGORI/Nightingale/actions/workflows/trivy.yml/badge.svg?branch=main)](https://github.com/RAJANAGORI/Nightingale/actions/workflows/trivy.yml)
[![Artifact Hub](https://img.shields.io/endpoint?url=https://artifacthub.io/badge/repository/nightingale)](https://artifacthub.io/packages/search?repo=nightingale)

![BlackHat Asia 2022](https://raw.githubusercontent.com/RAJANAGORI/Nightingale/main/assets/images/blackhat_2022.svg)
![BlackHat Asia 2023](https://raw.githubusercontent.com/RAJANAGORI/Nightingale/main/assets/images/blackhat_2023.svg)
![BlackHat Asia 2024](https://raw.githubusercontent.com/RAJANAGORI/Nightingale/main/assets/images/blackhat_2024.svg)
![OWASP AppSec EU 2022 2022](https://raw.githubusercontent.com/RAJANAGORI/Nightingale/main/assets/images/Owasp_Global_Appsec_EU.svg)

[![](https://img.shields.io/badge/-Follow-black?style=social&logo=Linkedin)](https://www.linkedin.com/in/raja-nagori/) [![](https://img.shields.io/twitter/follow/RajaNagori7?style=social&label=Follow)](https://twitter.com/RajaNagori7)
![profile count](https://komarev.com/ghpvc/?username=www-project-nightingale&color=blue)
[![Medium Badge](https://img.shields.io/badge/-@rajanagori-03a57a?style=flat-square&labelColor=000000&logo=Medium&link=https://medium.com/@rajanagori)](https://medium.com/@rajanagori)

### Conferences
- Blackhat Arsenal ASIA 2022
- OWAPS Global AppSec EU 2022
- Docker community hands on #6
- Blackhat Arsenal MEA 2022 (Shortlisted)
- Blackhat Arsenal ASIA 2023
- Blackhat Arsenal MEA 2023 (Shortlisted)
- Blackhat Arsenal ASIA 2024
## Project Name: Nightingale
==================================================
## Docker for Pentesters: Pentesting Framework

## Description
In today's technological era, docker is the most powerful technology in each and every domain, whether it is Development, cyber security, DevOps, Automation, or Infrastructure.

Considering the demand of the industry, I would like to introduce my idea to create a NIGHTINGALE: docker image for pentesters.

This docker image is ready to use environment with the required tools that are needed at the time of pentesting on any of the scopes, whether it can be web application penetration testing, network penetration testing, mobile, API, OSINT, or Forensics.

The best part is you can either create an altered docker image or pull the pre-built docker image from the hub.

Some of the best features are listed below, I would highly recommend going through it and starting penetrating into the application.
Link to access tool list : [tool list](https://owasp.org/www-project-nightingale/)

### Pros
1. No need to install multiple programming language support and multiple modules.
2. Booting process is very fast as per the virtualization concept.
3. Need as per use resource of the host machine.
4. All pre-install tools are installed and if you install any new software or tool use can go with that option.
5. You can perform vulnerability assessment and penetration testing of any scope.
6. You can access this docker container via browser by calling your local address.

### Why?
The Reason behind creating this Docker file is to make a platform-independent penetration toolkit. It includes all the useful tools that will be required for a penetration tester
(You can refer to the tool list section for the same).

Please feel free to contribute to the tool

For more information [Nightingale Wiki](https://github.com/RAJANAGORI/Nightingale/wiki/1-%F0%9F%9A%80-Nightingale-Docker-for-Pentesters)