Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/trganda/dockerv
Vulnerability Environment Build with Dockerfile -> Docker Hub
https://github.com/trganda/dockerv
docker docker-compose vulnerability vulnerability-research
Last synced: about 22 hours ago
JSON representation
Vulnerability Environment Build with Dockerfile -> Docker Hub
- Host: GitHub
- URL: https://github.com/trganda/dockerv
- Owner: trganda
- License: mit
- Created: 2020-08-29T05:04:43.000Z (over 4 years ago)
- Default Branch: main
- Last Pushed: 2024-11-29T06:43:50.000Z (about 2 months ago)
- Last Synced: 2024-11-29T07:29:18.513Z (about 2 months ago)
- Topics: docker, docker-compose, vulnerability, vulnerability-research
- Language: Java
- Homepage:
- Size: 27 MB
- Stars: 15
- Watchers: 2
- Forks: 3
- Open Issues: 14
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-security-vul-llm - trganda/dockerv - square) - Docker环境支持漏洞分析和开发,包含多个预构建的Docker镜像及使用说明,方便用户进行漏洞扫描和复现。 (LLM分析过程)
README
A self-using enviroment with docker support, for development and vulnerability analyze.
[vulhub](https://github.com/vulhub/vulhub) is docker based project for speed up enviroment creation. Is useful for vulnerability analyze and replay.
This repository was craeted because I'm lazy to pull request a new enviroment to `vulhub` and the most enviroment of `vulhub` has no detail on how they build the image, I know it's not the key point of that project but it's good for modifer and learning.[中文版本](README.zh-cn.md)
## Usage
Install `docker` and `docker-compose` before use it.
For detail, see [get-docker](https://docs.docker.com/get-docker/)
## List
- [buildenv](buildenv/)
- [archlinux](buildenv/archlinux/)
- [dependencytrack](buildevn/dependencytrack/)
- [gitea](buildenv/gitea/)
- [memos](buildenv/memos/)
- [openldap](buildenv/openldap/)
- [php](buildenv/php/)
- [vuln](vuln/)
- [apache activemq](vuln/apache%20activemq/)
- [CVE-2015-5524](vuln/apache%20activemq/CVE-2015-5524/)
- [apache solr](vuln/apache%20solr/)
- [CVE-2019-0193](vuln/apache%20solr/CVE-2019-0193/)
- [apache tomcat](vuln/apache%20tomcat/)
- [CVE-2016-8735](vuln/apache%20tomcat/CVE-2016-8735/)
- [CVE-2017-12615](vuln/apache%20tomcat/CVE-2017-12615/)
- [CVE-2017-12616](vuln/apache%20tomcat/CVE-2017-12616/)
- [CVE-2020-13935](vuln/apache%20tomcat/CVE-2020-13935/)
- [CVE-2023-28708](vuln/apache%20tomcat/CVE-2023-28708/)
- [apache unomi](vuln/apache%20unomi/)
- [CVE-2020-11975 & CVE-2020-13942](vuln/apache%20unomi/CVE-2020-11975%20%26%20CVE-2020-13942/)
- [atlassian confluence](vuln/atlassian%20confluence/)
- [CVE-2019-3396](vuln/atlassian%20confluence/CVE-2019-3396/)
- [CVE-2022-26134](vuln/atlassian%20confluence/CVE-2022-26134/)
- [altassian jira core](vuln/atlassian%20jira%20core/)
- [CVE-2022-0540](vuln/atlassian%20jira%20core/CVE-2022-0540/)
- [fusionauth](vuln/fusionauth/)
- [CVE-2020-7799](vuln/fusionauth/CVE-2020-7799/)
- [gitlab](vuln/gitlab/)
- [CVE-2016-9086](vuln/gitlab/CVE-2016-9086/)
- [CVE-2022-1162](vuln/gitlab/CVE-2022-1162/)
- [jboss](vuln/jboss/)
- [CVE-2007-1036](vuln/jboss/CVE-2007-1036/)
- [CVE-2010-0738](vuln/jboss/CVE-2010-0738/)
- [joomla](vuln/joomla/)
- [CVE-2015-8562](vuln/joomla/CVE-2015-8562/)
- [CVE-2017-14596](vuln/joomla/CVE-2017-14596/)
- [CVE-2023-23752](vuln/joomla/CVE-2023-23752/)
- [memcached](vuln/memcached/)
- [CVE-2016-8705](vuln/memcached/CVE-2016-8705/)
- [nginx](vuln/nginx/)
- [phpmailer](vuln/phpmailer/)
- [CVE-2016-10033](vuln/phpmailer/CVE-2016-10033/)
- [postgresql](vuln/postgresql/)
- [CVE-2019-9193](vuln/postgresql/CVE-2019-9193/)
- [saltstack](vuln/saltstack/)
- [CVE-2020-11651 & CVE-2020-11652](vuln/saltstack/CVE-2020-11651%26CVE-2020-11652/)
- [samba](vuln/samba/)
- [CVE-2015-0240](vuln/samba/CVE-2015-0240/)
- [spring](vuln/spring/)
- [CVE-2022-22980](vuln/spring/spring-data-mongodb/CVE-2022-22980/)
- [zabbix](vuln/zabbix/)
- [CVE-2022-23131](vuln/zabbix/CVE-2022-23131/)