Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/veerendra2/hacker-tools
aircrack-ng, kismet and ettercap in Docker
https://github.com/veerendra2/hacker-tools
docker-image dockerfile hackertools
Last synced: 2 months ago
JSON representation
aircrack-ng, kismet and ettercap in Docker
- Host: GitHub
- URL: https://github.com/veerendra2/hacker-tools
- Owner: veerendra2
- Created: 2016-11-23T11:54:07.000Z (about 8 years ago)
- Default Branch: master
- Last Pushed: 2019-07-01T10:57:15.000Z (over 5 years ago)
- Last Synced: 2024-05-01T16:07:20.583Z (8 months ago)
- Topics: docker-image, dockerfile, hackertools
- Language: Dockerfile
- Homepage:
- Size: 6.84 KB
- Stars: 24
- Watchers: 3
- Forks: 5
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
![Docker Stars](https://img.shields.io/docker/stars/veerendrav2/hacker-tools.svg?style=for-the-badge)
![GitHub stars](https://img.shields.io/github/stars/veerendra2/hacker-tools.svg?style=for-the-badge)
![Docker Pulls](https://img.shields.io/docker/pulls/veerendrav2/hacker-tools.svg?style=for-the-badge)
![MicroBadger Size (tag)](https://img.shields.io/microbadger/image-size/veerendrav2/hacker-tools/latest.svg?style=for-the-badge)# Hacker Tools Dockerfile
This repository is meant to build the base image for a Hacker Tools container.#### Tools included in this image.
| | Tools |
|:---------|:-----------------|
|0 | [Automated Wifi-Deauth script](https://github.com/veerendra2/wifi-deauth-attack) (Python Script in `/opt/`)
| 1 |[macof](http://manpages.ubuntu.com/manpages/xenial/man8/macof.8.html)|
|2| [yersinia](http://manpages.ubuntu.com/manpages/trusty/man8/yersinia.8.html)|
|3|[kismet](http://manpages.ubuntu.com/manpages/precise/man1/kismet.1.html)|
|4 |[nmap](http://manpages.ubuntu.com/manpages/xenial/man1/nmap.1.html)|
|5 |[dsniff](http://manpages.ubuntu.com/manpages/precise/man8/arpspoof.8.html)|
|6 |[dnsmaq](http://manpages.ubuntu.com/manpages/trusty/man8/dnsmasq.8.html)|
|7 |[hostapd](http://manpages.ubuntu.com/manpages/trusty/man8/hostapd.8.html)|
|8 |[ettercap](http://manpages.ubuntu.com/manpages/trusty/man8/ettercap.8.html)|
|9 |[conntrack](http://manpages.ubuntu.com/manpages/trusty/man8/conntrack.8.html)|
|10 |[traceroute](http://manpages.ubuntu.com/manpages/trusty/man1/traceroute.db.1.html)|
|11 |[tcpdump](http://manpages.ubuntu.com/manpages/trusty/man8/tcpdump.8.html)|
|12 |[scapy](http://www.secdev.org/projects/scapy/doc/)|
|13 |[airmon-ng](https://www.aircrack-ng.org/documentation.html) (with password dictionary `rockyou.txt` in `/opt/`)|
|14|[ping](http://manpages.ubuntu.com/manpages/trusty/man8/ping.8.html)|#### Pull the Image
###### `docker pull veerendrav2/hacker-tools`#### Run the Container
###### `docker run -it -d --net=host --privileged --name little-boy veerendrav2/hacker-tools`### NOTE:
##### Must run the container with `--net=host --privileged` option. Then only you can capture the packets and monitor the network on physical interface(Example: `wlan0`)