A multiplatform web hacking toolkit Docker image.
You can pull the Docker image from Docker Hub as below.
docker pull signedsecurity/web-hacking-toolkit
or:
docker run -it signedsecurity/web-hacking-toolkit /bin/bash
Docker-Compose can also be used.
version: "3.9"
services:
web-hacking-toolkit:
image: signedsecurity/web-hacking-toolkit:latest
container_name: web-hacking-toolkit
hostname: web-hacking-toolkit
stdin_open: true
ports:
- "22:22"
volumes:
- ./data:/root/data
restart: unless-stopped
git clone https://github.com/signedsecurity/web-hacking-toolkit.git && \
cd web-hacking-toolkit && \
make build
By default, no GUI tools can be run in a Docker container as no X11 server is available. To run them, you must change that. What is required to do so depends on your host machine. If you:
- run on Linux, you probably have X11
- run on Mac OS, you need Xquartz (
brew install Xquartz
) - run on Windows, you have a problem
Use X11 forwarding through SSH if you want to go this way. Run start_ssh
inside the container to start the server, make sure you expose port 22 when starting the container: docker run -p 127.0.0.1:22:22 ...
, then use ssh -X ...
when connecting (the script prints the password).
Interface | Name | Description |
---|---|---|
CLI | Amass | In-depth Attack Surface Mapping and Asset Discovery |
CLI | anew | A tool for adding new lines to files, skipping duplicates |
CLI | curl | A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, MQTT, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features |
CLI | dnsx | dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers. |
CLI | ffuf | Fast web fuzzer written in Go |
CLI | findomain | The fastest and cross-platform subdomain enumerator, do not waste your time. |
CLI | httpx | httpx is a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads. |
CLI | naabu | A fast port scanner written in go with focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests |
CLI | nmap | Nmap - the Network Mapper. Github mirror of official SVN repository. |
CLI | sigurlfind3r | A passive reconnaissance tool for known URLs discovery - it gathers a list of URLs passively using various online sources. |
CLI | sigurlscann3r | A web application attack surface mapping tool. It takes in a list of urls then performs numerous probes |
CLI | subdomains.sh | A wrapper around for subdomains gathering tools (amass, subfinder, findomain & sigsubfind3r) to increase gathering efficiency and automating the workflow. |
CLI | subfinder | Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing. |
CLI | wuzz | Interactive cli tool for HTTP inspection |
Wordlist | Description |
---|---|
SecLists | SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. |
jhaddix / content_discovery_all.txt | a masterlist of content discovery URLs and files (used most commonly with gobuster) |