An open API service indexing awesome lists of open source software.

https://github.com/alexrf45/SCRT

Repeatable, immutable, and scalable security research w/ Docker
https://github.com/alexrf45/SCRT

bug-bounty docker kali-linux penetration-testing red-team zsh

Last synced: 3 months ago
JSON representation

Repeatable, immutable, and scalable security research w/ Docker

Awesome Lists containing this project

README

          

# gr3ysh3ll

![GitHub Release](https://img.shields.io/github/v/release/alexrf45/gr3ysh3ll?display_name=tag&style=plastic)
![Logo](https://img.shields.io/docker/image-size/fonalex45/gr3ysh3ll) ![Logo](https://img.shields.io/docker/pulls/fonalex45/gr3ysh3ll)

> **gr3ysh3ll** — a disposable, flexible, and repeatable container environment for security researchers, analysts, and enthusiasts.
> **Launch anywhere. Burn after use. Repeat.**

---

## 🚀 What is gr3ysh3ll?

**gr3ysh3ll** is a containerized security research environment designed for offensive and defensive operations. Whether you're doing recon, exploitation, analysis, or tool testing, `gr3ysh3ll` gives you:

- 🐳 **Containerized environments** — consistent environments every time
- 🔁 **Burnable instances** — throwaway containers that keep the host OS clean
- ☁️ **Portable deployments** — run it locally, in the cloud or kubernetes

---

## 📦 Features

- Lightweight base image with common pentesting utilities
- Persistant containers, volumes and workspaces
- ZSH-powered shell with rich prompt
- Pre-configured Tmux configuration
- GUI apps such as burpsuite and firefox
- Bash script executable (Docker compose in the works)
- Cloud-ready: works on EC2, GCP, or K8s

---

## 🛠️ Getting Started

### 🔧 Requirements

- Docker or Podman
- (Optional) Docker Compose
- Bash or ZSH

### 📥 Pull the Image

```bash
docker pull fonalex45/gr3ysh3ll:latest

```

### Custom aliases included

```bash
alias cme='nxc'
alias port-scan='sudo nmap -sC -sV -p- $IP > scan.txt'
alias udp-scan='sudo nmap -sU --top-ports 10 $IP -v > udp.scan.txt'
alias stealth-scan='sudo nmap --data-length 6 -T3 -A -ttl 64 -p- $IP > stealth-scan.txt'
alias public='curl wtfismyip.com/text'
alias t='tmux new -f ~/.tmux.conf -s $1'
alias :q='exit'
alias home='cd ~'
alias :r='. ~/.bashrc'
alias update='sudo apt update'
alias upgrade='sudo apt upgrade -y'
alias i='sudo apt install -y'
alias ls='ls --color=auto'
alias command='cat $HOME/.commands'
alias proxy='proxychains'
alias serve='sudo python3 -m http.server 80'
```

## Command history

- Useful commands are already built into the container history. Simple type `CTRL+r' to pull up the fzf window and filter for commands. fzf makes navigating commands and files a breeze.

### 🤘 Contributing

Have an idea, bug, or tool request? Open an issue or submit a PR.