amitie10g/kali
Kali Linux for all needs
3.8K
This is a somewhat customised set of Docker images of Kali Linux, for both platforms amd64
(Docker Desktop on Windows, cloud, etc.) and arm64
(Raspberry Pi, Apple Silicon Mac, etc.), and two flavors, kali-rolling
(kali
is the same image) and kali-bleeding-edge
. Out-of-the-box tools for all needs!
Images has been built using GitHub Actions. The Dockerfile is passed through stdin to Buildkit to build every image. A basic Dockerfile is provided as well.
upstream
the base image built with the Phusion's base image project modifications
base
Image with basic tools, TOR, and kalitorify (forked from the upstream repo to add Dockerfile and pull requests)
nano
lynx
tor
make
iptables
kali-linux-wsl
desktop
Base desktop (XFCE) without further tools. Includes Firefox
kali-desktop-xfce
xrdp
dbus-x11
latest
top10
desktop-top10
Most used set of tools on top of Desktop image
kali-linux-top10
maltego
(not installed by default in kali-tools-top10
but installed by default here)headless
Tools that dont require graphical environment (large)
labs
exploitable
vulnerable
Intentionally vulnerable web applications: Damn Vulnerable Web Application and OWASP Juice Shop
kali-linux-labs
dvwa
juice-shop
nethunter
The Kali Linux NetHunter system
tools
The kali-tools-*
packages on top of Desktop Top 10 (latest
) image
kali-tools-crypto-stego
kali-tools-database
kali-tools-detect
kali-tools-exploitation
kali-tools-forensics
kali-tools-fuzzing
kali-tools-gpu
kali-tools-hardware
kali-tools-identify
kali-tools-information-gathering
kali-tools-passwords
kali-tools-post-exploitation
kali-tools-protect
kali-tools-reporting
kali-tools-respond
kali-tools-reverse-engineering
kali-tools-reverse-engineering
kali-tools-sniffing-spoofing
kali-tools-social-engineering
kali-tools-voip
kali-tools-vulnerability
kali-tools-web
kali-tools-windows-resources
kali-tools-wireless
Just download docker-compose.yml, place at an empty directory, and run docker-compose up
This will start the latest
and labs
containers (if you use Windows, be sure to replace the incoming port to 13389 do avoid conflicts with the local Remote Desktop port)
Browse the vulnerable webapps:
Or use the tools available to attemp to exploit those web apps
-v ${pwd}\kali:/home/kali -v ${pwd}\root:/root
when running on Docker Desktop on Windows (Powershell)-p 3389:3389
when running docker run
to expose Remote Desktop por to connect via XRDP (use -p 13389:3389
if you're running on Docker Desktop on Windows)--cap-add=NET_ADMIN --cap-add=NET_RAW
when running docker run
to allow kalitorify to modify iptables and set up it successfully--user root
when running docker exec
to get interactive shell as rootThe image depends on a Kali Linux base image built using the instructions on the Phusion's base image repo.
docker build --build-arg KALI_VER=<version> --build-arg TOOL=<tool> --target <target> -t amitie10g/kali-linux:<tag> .
Where build arg,
KALI_VER
The kali edition: rolling
, bleeding-edge
, last-release
or experimental
(if unsure, choose rolling
)TOOL
One of the packages starting with kali-tools-
--target
The desired target:
base
Just the base imagedesktop
The Desktop (XFCE, without tools) imagedesktop-top10
The desktop experience plus the top 10 toolslabs
The vulnerable webappsheadless
The cli-only toolsnethunter
The Kali Nethunter systemtool
The target for build the desired toolEdit the Dockerfile to fit your needs.
Q: Why you created this project
A: I'm preparing for diploma in cybersecurity, and as my hobby is create Docker containers, I created this as part of my tasks. As this will be useful for everyone, I'be compromised to maintain this project.
Q: Why s6-overlay
A: Because this eases the process of bringing required services for tools (eg. Postgres for Metasploit).
Q: Why XRDP instead o VNC?
A: a) most of the users uses Windows, and the Remote Desktop client is integrated, and runs seamlessly; and b) performance.
docker pull amitie10g/kali