https://github.com/alexrf45/SCRT
Repeatable, immutable, and scalable security research w/ Docker
https://github.com/alexrf45/SCRT
bug-bounty docker kali-linux penetration-testing red-team zsh
Last synced: 3 months ago
JSON representation
Repeatable, immutable, and scalable security research w/ Docker
- Host: GitHub
- URL: https://github.com/alexrf45/SCRT
- Owner: alexrf45
- Created: 2022-12-04T18:32:45.000Z (almost 3 years ago)
- Default Branch: main
- Last Pushed: 2024-05-23T01:40:27.000Z (over 1 year ago)
- Last Synced: 2024-05-23T01:43:28.471Z (over 1 year ago)
- Topics: bug-bounty, docker, kali-linux, penetration-testing, red-team, zsh
- Language: Shell
- Homepage:
- Size: 83.1 MB
- Stars: 5
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - alexrf45/aegis - Repeatable, immutable, and scalable security research w/ Docker (JavaScript)
README
# gr3ysh3ll

 
> **gr3ysh3ll** — a disposable, flexible, and repeatable container environment for security researchers, analysts, and enthusiasts.
> **Launch anywhere. Burn after use. Repeat.**
---
## 🚀 What is gr3ysh3ll?
**gr3ysh3ll** is a containerized security research environment designed for offensive and defensive operations. Whether you're doing recon, exploitation, analysis, or tool testing, `gr3ysh3ll` gives you:
- 🐳 **Containerized environments** — consistent environments every time
- 🔁 **Burnable instances** — throwaway containers that keep the host OS clean
- ☁️ **Portable deployments** — run it locally, in the cloud or kubernetes
---
## 📦 Features
- Lightweight base image with common pentesting utilities
- Persistant containers, volumes and workspaces
- ZSH-powered shell with rich prompt
- Pre-configured Tmux configuration
- GUI apps such as burpsuite and firefox
- Bash script executable (Docker compose in the works)
- Cloud-ready: works on EC2, GCP, or K8s
---
## 🛠️ Getting Started
### 🔧 Requirements
- Docker or Podman
- (Optional) Docker Compose
- Bash or ZSH
### 📥 Pull the Image
```bash
docker pull fonalex45/gr3ysh3ll:latest
```
### Custom aliases included
```bash
alias cme='nxc'
alias port-scan='sudo nmap -sC -sV -p- $IP > scan.txt'
alias udp-scan='sudo nmap -sU --top-ports 10 $IP -v > udp.scan.txt'
alias stealth-scan='sudo nmap --data-length 6 -T3 -A -ttl 64 -p- $IP > stealth-scan.txt'
alias public='curl wtfismyip.com/text'
alias t='tmux new -f ~/.tmux.conf -s $1'
alias :q='exit'
alias home='cd ~'
alias :r='. ~/.bashrc'
alias update='sudo apt update'
alias upgrade='sudo apt upgrade -y'
alias i='sudo apt install -y'
alias ls='ls --color=auto'
alias command='cat $HOME/.commands'
alias proxy='proxychains'
alias serve='sudo python3 -m http.server 80'
```
## Command history
- Useful commands are already built into the container history. Simple type `CTRL+r' to pull up the fzf window and filter for commands. fzf makes navigating commands and files a breeze.
### 🤘 Contributing
Have an idea, bug, or tool request? Open an issue or submit a PR.