dimjones/toolbox
A toolbox to use everywhere, every time.
449
The goal of this toolbox is to provide a set of tools to help you in your daily work. These tools are designed to be used in a terminal. Some of them are used for network analysis, others for file manipulation, and so on.
Based on the small alpine Linux distribution, this toolbox embeds these tools:
docker run --rm -it dimjones/toolbox curl https://www.google.com
For example, to down a file from the web in the host machine :
docker run --rm -it -v "$(pwd):/tmp" dimjones/toolbox wget -P /tmp https://www.google.com
Downloading a file with verbose mode :
docker run --rm -it -v "$(pwd):/tmp" dimjones/toolbox wget -P /tmp -v https://www.google.com
Edit a file in the host machine (Linux and also Windows and Mac) with vim :
docker run -it --rm -v "${PWD}:/tmp" dimjones/toolbox vim /tmp/tmpfile.txt
Edit a file in the host machine with nano :
docker run --rm -it -v "$(pwd):/tmp" dimjones/toolbox nano /tmp/yourfile
docker run --rm -it --pid=host dimjones/toolbox htop
The tcpdump command is very powerful and can be used in many ways. Here is an example to capture all the packets on the network interface eth0 and to write the output in a file:
docker run --rm -it --net=host dimjones/toolbox tcpdump -i eth0 -w /tmp/capture.pcap
Notice that you will need to use the --net=host
option to capture the packets on the host network interface.
Nmap could be used in different ways. Here are some examples to scan the network and to find the active hosts :
docker run --rm -it --net=host dimjones/toolbox nmap 192.168.1.0/24
docker run --rm -it --net=host dimjones/toolbox nmap -F IP
docker run --rm -it --net=host dimjones/toolbox nmap -O IP
Use git with your own configuration (get in mind to copy the .gitconfig file in your container during the build process) :
docker run --rm -it -v ~/.gitconfig:/root/.gitconfig dimjones/toolbox git clone
Use jq to parse a json file :
docker run -it --rm -v "$(pwd)/file.json:/tmp/file.json" dimjones/toolbox jq . /tmp/file.json
Netcat could be used in many different ways. Here is an example to check a specific port is opened :
docker run -it --rm dimjones/toolbox nc -zv IP PORT
Use dig to get the IP address of a domain name :
docker run --rm -it dimjones/toolbox dig www.google.com
Use traceroute to trace the route of a packet :
docker run --rm -it dimjones/toolbox traceroute www.google.com
The antivirus version embeds the ClamAV antivirus to scan files. It's a good way to scan files without installing the antivirus on your machine.
docker run -it --rm -v "$(pwd):/toscan" dimjones/toolbox:antivirus bash
89e3b57cdd08:/# freshclam
89e3b57cdd08:/# clamscan -r /toscan
This toolbox is under the MIT licence. You can use it as you want. If you want to improve it, feel free to do it and to share it with the community.
docker pull dimjones/toolbox