An open API service indexing awesome lists of open source software.

https://github.com/RAJANAGORI/Nightingale

It's a Docker Environment for Pentesting which having all the required tool for VAPT.
https://github.com/RAJANAGORI/Nightingale

bugbounty cybersecurity docker-image hacking hacking-tools htb nightingale osint owasp penetration-testing pentest-tool pentesting platform-independent vulnerabilities

Last synced: 4 months ago
JSON representation

It's a Docker Environment for Pentesting which having all the required tool for VAPT.

Awesome Lists containing this project

README

          

# Docker for Pentesters

![Nightingale Logo](https://raw.githubusercontent.com/OWASP/www-project-nightingale/main/assets/images/Nightingale.png)

---

## Badges

### Project and CI/CD
[![OpenSSF Best Practices](https://www.bestpractices.dev/projects/7881/badge)](https://www.bestpractices.dev/projects/7881)
[![OWASP Incubator](https://img.shields.io/badge/owasp-incubator-blue.svg)](https://www.owasp.org/index.php/Category:OWASP_Project#tab=Project_Inventory)
[![Docker Image CI](https://github.com/RAJANAGORI/Nightingale/actions/workflows/docker-image.yaml/badge.svg)](https://github.com/RAJANAGORI/Nightingale/actions/workflows/docker-image.yaml)
[![Multi OS Docker Images - ARM64 macOS](https://github.com/RAJANAGORI/Nightingale/actions/workflows/multi-os-arm64.yaml/badge.svg)](https://github.com/RAJANAGORI/Nightingale/actions/workflows/multi-os-arm64.yaml)
[![Artifact Hub](https://img.shields.io/endpoint?url=https://artifacthub.io/badge/repository/nightingale)](https://artifacthub.io/packages/search?repo=nightingale)
[![Trivy Scan](https://github.com/RAJANAGORI/Nightingale/actions/workflows/trivy.yml/badge.svg)](https://github.com/RAJANAGORI/Nightingale/actions/workflows/trivy.yml)

---

### Events and Recognitions
![BlackHat Asia 2022](https://raw.githubusercontent.com/RAJANAGORI/Nightingale/main/assets/images/blackhat_2022.svg)
![BlackHat Asia 2023](https://raw.githubusercontent.com/RAJANAGORI/Nightingale/main/assets/images/blackhat_2023.svg)
![BlackHat Asia 2024](https://raw.githubusercontent.com/RAJANAGORI/Nightingale/main/assets/images/blackhat_2024.svg)
![IWCON 2023](https://raw.githubusercontent.com/RAJANAGORI/Nightingale/main/assets/images/IWCON.svg)
![c0c0n 2024](https://raw.githubusercontent.com/RAJANAGORI/Nightingale/main/assets/images/c0c0n.svg)
![OWASP AppSec EU 2022](https://raw.githubusercontent.com/RAJANAGORI/Nightingale/main/assets/images/Owasp_Global_Appsec_EU.svg)

---

### Social and Profiles
[![Follow on LinkedIn](https://img.shields.io/badge/-Follow-black?style=social&logo=Linkedin)](https://www.linkedin.com/in/raja-nagori/)
[![Follow on Twitter](https://img.shields.io/twitter/follow/RajaNagori7?style=social&label=Follow)](https://twitter.com/RajaNagori7)
![Profile Views](https://komarev.com/ghpvc/?username=www-project-nightingale&color=blue)
[![Medium Badge](https://img.shields.io/badge/-@rajanagori-03a57a?style=flat-square&labelColor=000000&logo=Medium&link=https://medium.com/@rajanagori)](https://medium.com/@rajanagori)

### Conferences
- Blackhat Arsenal ASIA 2022
- OWASP Global AppSec EU 2022
- Docker community hands-on event
- Blackhat Arsenal MEA 2022 (Shortlisted)
- Blackhat Arsenal ASIA 2023
- Blackhat Arsenal MEA 2023 (Shortlisted)
- Blackhat Arsenal Asia 2024
- IWCON - 2023
- c0c0n - 2024

## Project Name: Nightingale
==================================================
# Docker for Pentesters: Pentesting Framework

## Description
In today's technological era, Docker is the most powerful technology across various domains, whether it's Development, Cybersecurity, DevOps, Automation, or Infrastructure.

Considering the demand of the industry, I would like to introduce my idea to create **NIGHTINGALE**: a Docker image for pentesters.

This Docker image provides a ready-to-use environment with the tools required for pentesting across different scopes, including web application penetration testing, network penetration testing, mobile, API, OSINT, or Forensics.

The best part is that you can either create an altered Docker image or pull the pre-built Docker image from the hub.

Some of the best features are listed below; I would highly recommend going through them before starting to penetrate the application. **Link to access tool list**: ([tool list](https://github.com/RAJANAGORI/Nightingale/wiki/6-%F0%9F%9B%A0%EF%B8%8F-Tools-list))

## Pros
- No need to install multiple programming language supports and modules.
- The booting process is very fast due to the virtualization concept.
- Uses resources from the host machine as needed.
- All pre-installed tools are ready, and you can install new software or tools if required.
- You can perform vulnerability assessments and penetration testing on any scope.
- You can access this Docker container via a browser by calling your local address.

## Why?
The reason behind creating this Docker image is to make a platform-independent penetration toolkit. It includes all the useful tools that a penetration tester might need (refer to the tool list section for details).

Please feel free to contribute to the tool.

For more information [Nightingale Wiki](https://github.com/RAJANAGORI/Nightingale/wiki/1-%F0%9F%9A%80-Nightingale-Docker-for-Pentesters)