Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/tanq16/containerized-security-toolkit
Refer to this repository to use a containerized security workflow or build your custom workflow with these containers as a base.
https://github.com/tanq16/containerized-security-toolkit
attack-tools cloud cloud-security cloudsecurity command-line container containerized-services developer-tools docker dockerfile hacking network network-pentesting network-security penetration-testing pentesting security-scan security-toolkit security-tools security-toolset
Last synced: about 1 month ago
JSON representation
Refer to this repository to use a containerized security workflow or build your custom workflow with these containers as a base.
- Host: GitHub
- URL: https://github.com/tanq16/containerized-security-toolkit
- Owner: Tanq16
- License: mit
- Created: 2021-08-28T01:25:49.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2024-07-30T00:44:08.000Z (6 months ago)
- Last Synced: 2024-07-30T05:25:29.371Z (6 months ago)
- Topics: attack-tools, cloud, cloud-security, cloudsecurity, command-line, container, containerized-services, developer-tools, docker, dockerfile, hacking, network, network-pentesting, network-security, penetration-testing, pentesting, security-scan, security-toolkit, security-tools, security-toolset
- Language: Dockerfile
- Homepage:
- Size: 2.47 MB
- Stars: 7
- Watchers: 1
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
- Security: security_docker_amd/Dockerfile
Awesome Lists containing this project
README
Containerized Security Toolkit (CST)
Documentation • Docker Hub (User)
A comprehensive suite of containerized security toolkits for various security operations
Build Status:
(All ARM images build through CCI until ARM GHA runners are available)## Overview
The Containerized Security Toolkit (CST) provides a comprehensive suite of Docker images tailored for various security operations. Each variant is designed for specific use cases while maintaining consistency in basic functionality:
- **General** (`tanq16/cst-general:*`): Core security tools and utilities for general security operations
- **Cloud** (`tanq16/cst-cloud:*`): Specialized for cloud security assessments and operations
- **Dev** (`tanq16/cst-dev:*`): Development environment with security tools (Python, Go, Node.js) - `WIP`
- **Netsec** (`tanq16/cst-netsec:*`): Network security assessment and monitoring tools - `WIP`
- **Rice** (`tanq16/cst-rice:*`): Enhanced version of General with [CLI Productivity Suite](https://github.com/Tanq16/cli-productivity-suite)Each variant is available for both x86_64 and ARM64 architectures:
```
tanq16/cst-:amd # For x86_64 systems
tanq16/cst-:arm # For ARM64 systems (Apple Silicon, etc.)
```## Quickstart
Get started with the General variant in seconds:
```bash
# Create persistence directory
mkdir -p $HOME/docker_work/# Run container (use general-arm for ARM64 systems)
docker run --name="cst_general" \
-v $HOME/docker_work/:/persist \
--rm -it tanq16/cst-general:amd \
/bin/bash
```For advanced usage patterns, variant-specific guides, and comprehensive documentation:
- 📚 [Full Documentation](https://tanishq.page/containerized-security-toolkit)
- 🚀 [Advanced Workflows](https://tanishq.page/containerized-security-toolkit/advanced/shortcuts)
- 🔧 [Tool Lists](https://tanishq.page/containerized-security-toolkit/tools/general-tools)## Key Features
- 🔄 **Persistent Storage**: Mount local directories for data persistence
- 🔒 **Secure Design**: Regular security updates and best practices
- 🎯 **Purpose-Built**: Each variant optimized for specific security tasks
- 🔧 **Rich Tooling**: Comprehensive set of pre-installed security tools
- 📦 **Consistent Environment**: Reproducible setup across systems
- 🖥️ **Cross-Platform**: Full support for both x86_64 and ARM64## Contributing
Check out [contribution guidelines](https://tanishq.page/containerized-security-toolkit/home/contributing) for details on how to submit changes.
## License
This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.