Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/tanq16/containerized-security-toolkit

Refer to this repository to use a containerized security workflow or build your custom workflow with these containers as a base.
https://github.com/tanq16/containerized-security-toolkit

attack-tools cloud cloud-security cloudsecurity command-line container containerized-services developer-tools docker dockerfile hacking network network-pentesting network-security penetration-testing pentesting security-scan security-toolkit security-tools security-toolset

Last synced: about 1 month ago
JSON representation

Refer to this repository to use a containerized security workflow or build your custom workflow with these containers as a base.

Awesome Lists containing this project

README

        




CST


Containerized Security Toolkit (CST)






DocumentationDocker Hub (User)



A comprehensive suite of containerized security toolkits for various security operations


Build Status:

General BuildCloud BuildRice Build




(All ARM images build through CCI until ARM GHA runners are available)

## Overview

The Containerized Security Toolkit (CST) provides a comprehensive suite of Docker images tailored for various security operations. Each variant is designed for specific use cases while maintaining consistency in basic functionality:

- **General** (`tanq16/cst-general:*`): Core security tools and utilities for general security operations
- **Cloud** (`tanq16/cst-cloud:*`): Specialized for cloud security assessments and operations
- **Dev** (`tanq16/cst-dev:*`): Development environment with security tools (Python, Go, Node.js) - `WIP`
- **Netsec** (`tanq16/cst-netsec:*`): Network security assessment and monitoring tools - `WIP`
- **Rice** (`tanq16/cst-rice:*`): Enhanced version of General with [CLI Productivity Suite](https://github.com/Tanq16/cli-productivity-suite)

Each variant is available for both x86_64 and ARM64 architectures:

```
tanq16/cst-:amd # For x86_64 systems
tanq16/cst-:arm # For ARM64 systems (Apple Silicon, etc.)
```

## Quickstart

Get started with the General variant in seconds:

```bash
# Create persistence directory
mkdir -p $HOME/docker_work/

# Run container (use general-arm for ARM64 systems)
docker run --name="cst_general" \
-v $HOME/docker_work/:/persist \
--rm -it tanq16/cst-general:amd \
/bin/bash
```

For advanced usage patterns, variant-specific guides, and comprehensive documentation:
- 📚 [Full Documentation](https://tanishq.page/containerized-security-toolkit)
- 🚀 [Advanced Workflows](https://tanishq.page/containerized-security-toolkit/advanced/shortcuts)
- 🔧 [Tool Lists](https://tanishq.page/containerized-security-toolkit/tools/general-tools)

## Key Features

- 🔄 **Persistent Storage**: Mount local directories for data persistence
- 🔒 **Secure Design**: Regular security updates and best practices
- 🎯 **Purpose-Built**: Each variant optimized for specific security tasks
- 🔧 **Rich Tooling**: Comprehensive set of pre-installed security tools
- 📦 **Consistent Environment**: Reproducible setup across systems
- 🖥️ **Cross-Platform**: Full support for both x86_64 and ARM64

## Contributing

Check out [contribution guidelines](https://tanishq.page/containerized-security-toolkit/home/contributing) for details on how to submit changes.

## License

This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.