Docker Container for Penetration Testing/Red Teaming
This project is/will be a indirectly connected project of SneakAttack Dockerfiles
Docker Container for Penetration Testing
docker build -t sneakattack .
SneakAttack OS
Pentest tool list for information gathering Reconnaissance against a target to gather as much information as possible to be utilized when penetrating the target during the vulnerability assessment and exploitation phases.
Pentest tool list for vulnerability analysis Discovering flaws in systems and applications which can be leveraged by an attacker. These flaws can range anywhere from host and service misconfiguration, or insecure application design.
Pentest tool list for web analysis Discovering information and flaws in web applications layer.
Pentest tool list for exploitation Establishing access to a system or resource by bypassing security restrictions.
A collection of tools used for maintaining access once a connection has been established.
Pentest tool list for post exploitation Determine the value of the machine compromised and to maintain control of the machine for later use.
A collection of tools used for password attacks such as creating wordlists, brute force.
A collection of tools used for wireless audits, attacks and exploits.
A collection of tools used for monitoring and sniffing the data flowing over computer networks.
A Collection of tools used for identification, collection, preservation, acquisition, investigation, analysis and reporting of digital devices and data.
A collection of tools used for reverse engineering software and binaries
The collection of tools used for gathering data and reports when performing pentests.
This of all the headless tools that can be useful on a remotely controlled cloud environment.