Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/cybersecurity-dev/docker-toolkit
Reusable Docker Scripting Toolkit for Development Environment Setup
https://github.com/cybersecurity-dev/docker-toolkit
docker dockerfile dockerhub pcap-analyzer
Last synced: 18 days ago
JSON representation
Reusable Docker Scripting Toolkit for Development Environment Setup
- Host: GitHub
- URL: https://github.com/cybersecurity-dev/docker-toolkit
- Owner: cybersecurity-dev
- License: apache-2.0
- Created: 2024-07-22T11:10:41.000Z (6 months ago)
- Default Branch: main
- Last Pushed: 2024-12-27T11:05:09.000Z (24 days ago)
- Last Synced: 2024-12-27T11:18:51.846Z (24 days ago)
- Topics: docker, dockerfile, dockerhub, pcap-analyzer
- Language: Dockerfile
- Homepage: https://www.docker.com/
- Size: 34.2 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# docker-toolkit
Reusable Docker Toolkit Scripting for Development Environment## :clipboard: Autokeras
### :fast_forward: Quick Start
Building the image:
```console
# docker build . --file Dockerfile --tag cyberthreatdefense/autokeras
[...]
<<>>
[...]
```Starting it up with the current working directory mounted as `/mnt/share` in the container:
```console
# docker run -it -h autokeras -v `pwd`:/mnt/share cyberthreatdefense/autokeras
```
```powershell
# docker run -it -h autokeras -v ${PWD}:/mnt/share cyberthreatdefense/autokeras
```## :clipboard: Detect-It-Easy
### :fast_forward: Quick Start
Building the image:
```console
# docker build . --file Dockerfile --tag cyberthreatdefense/diec
[...]
<<>>
[...]
```Starting it up with the current working directory mounted as `/mnt/share` in the container:
```console
# docker run -it -h diec -v `pwd`:/mnt/share cyberthreatdefense/diec
```
```powershell
# docker run -it -h diec -v ${PWD}:/mnt/share cyberthreatdefense/diec
```## :clipboard: Manalyze
### :fast_forward: Quick Start
Building the image:
```console
# docker build . --file Dockerfile.ubuntu --tag cyberthreatdefense/manalyze-ubuntu
[...]
<<>>
[...]
```
```console
# docker build . --file Dockerfile.alpine --tag cyberthreatdefense/manalyze-alpine
[...]
<<>>
[...]
```Starting it up with the current working directory mounted as `/mnt/share` in the container:
```console
# docker run -it -h manalyze-ubuntu -v `pwd`:/mnt/share cyberthreatdefense/manalyze-ubuntu
```
```powershell
# docker run -it -h manalyze-ubuntu -v ${PWD}:/mnt/share cyberthreatdefense/manalyze-ubuntu
```
```console
# docker run -it -h manalyze-alpine -v `pwd`:/mnt/share cyberthreatdefense/manalyze-alpine
```
```powershell
# docker run -it -h manalyze-alpine -v ${PWD}:/mnt/share cyberthreatdefense/manalyze-alpine
```## :clipboard: PCAP Extractor
### :fast_forward: Quick Start
Building the image:
```console
# docker build . --file Dockerfile --tag cyberthreatdefense/pcap-extractor
[...]
<<>>
[...]
```Starting it up with the current working directory mounted as `/mnt/share` in the container:
```console
# docker run -it -h pcap-extractor -v `pwd`:/mnt/share cyberthreatdefense/pcap-extractor
```
```powershell
# docker run -it -h pcap-extractor -v ${PWD}:/mnt/share cyberthreatdefense/pcap-extractor
```## :clipboard: ML Malware Detection Competition/MalConv-Keras Malware Analysis Environment
### :fast_forward: Quick Start
Building the image:
```console
# docker build . --file Dockerfile --tag cyberthreatdefense/malconv-keras-malware-benchmark
[...]
<<>>
[...]
```Starting it up with the current working directory mounted as `/mnt/share` in the container:
```console
# docker run -it -h malconv-keras-malware-benchmark -v `pwd`:/mnt/share cyberthreatdefense/malconv-keras-malware-benchmark
```
```powershell
# docker run -it -h malconv-keras-malware-benchmark -v ${PWD}:/mnt/share cyberthreatdefense/malconv-keras-malware-benchmark
```## :clipboard: ML Malware Detection Competition/EMBER Malware Analysis Environment
### :fast_forward: Quick Start
Building the image:
```console
# docker build . --file Dockerfile --tag cyberthreatdefense/ember-malware-benchmark
[...]
<<>>
[...]
```Starting it up with the current working directory mounted as `/mnt/share` in the container:
```console
# docker run -it -h ember-malware-benchmark -v `pwd`:/mnt/share cyberthreatdefense/ember-malware-benchmark
```
```powershell
# docker run -it -h ember-malware-benchmark -v ${PWD}:/mnt/share cyberthreatdefense/ember-malware-benchmark
```