A multi-platform web hacking toolkit Docker image with Graphical User Interface (GUI) support.
Installation
Docker
Pull the image from Docker Hub:
docker pull signedsecurity/web-hacking-toolkit
Run a container and attach a shell:
docker run --rm -it --name web-hacking-toolkit signedsecurity/web-hacking-toolkit /usr/bin/zsh
Docker Compose
Docker-Compose can also be used.
version: "3.9"services:
web-hacking-toolkit:
image: signedsecurity/web-hacking-toolkit
container_name: web-hacking-toolkit
hostname: web-hacking-toolkit
stdin_open: true
ports:
- "22:22" # exposed for GUI support sing SSH with X11 forwarding
volumes:
- ./data:/root/data
restart: unless-stopped
Build and run container:
Attach shell:
docker-compose exec web-hacking-toolkit /usr/bin/zsh
Build from Source
Clone this repository and build the image:
git clone https://github.com/signedsecurity/web-hacking-toolkit.git && \
cd web-hacking-toolkit && \
make build
Run a container and attach a shell:
docker run --rm -it --name web-hacking-toolkit signedsecurity/web-hacking-toolkit /usr/bin/zsh
GUI Support
By default, no GUI tools can be run in a Docker container as no X11 server is available. To run them, you must change that. What is required to do so depends on your host machine. If you:
- run on Linux, you probably have X11
- run on Mac OS, you need Xquartz (
brew install Xquartz
) - run on Windows, you have a problem
Using SSH with X11 forwarding
Use X11 forwarding through SSH if you want to go this way. Run start_ssh
inside the container to start the server, make sure you expose port 22 when starting the container: docker run -p 127.0.0.1:22:22 ...
, then use ssh -X ...
when connecting (the script prints the password).
Installed
Tools
Interface | Name | Description |
---|---|---|
CLI | Amass | In-depth Attack Surface Mapping and Asset Discovery |
CLI | anew | A tool for adding new lines to files, skipping duplicates |
GUI | Burp Suite Community | The BurpSuite Project community edition |
CLI | curl | A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, MQTT, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features |
CLI | dnsx | dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers. |
CLI | ffuf | Fast web fuzzer written in Go |
CLI | findomain | The fastest and cross-platform subdomain enumerator, do not waste your time. |
GUI | firefox | Safe and easy web browser from Mozilla |
CLI | html-tool | Take URLs or filenames for HTML documents on stdin and extract tag contents, attribute values, or comments |
CLI | httpx | httpx is a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads. |
CLI | naabu | A fast port scanner written in go with focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests |
CLI | nmap | Nmap - the Network Mapper. Github mirror of official SVN repository. |
CLI | sigsubfind3r | A subdomain discovery tool - it gathers a list of subdomains passively using various online sources. |
CLI | sigurlfind3r | A passive reconnaissance tool for known URLs discovery - it gathers a list of URLs passively using various online sources. |
CLI | sigurlscann3r | A web application attack surface mapping tool. It takes in a list of urls then performs numerous probes |
CLI | subdomains.sh | A wrapper around for subdomains gathering tools (amass, subfinder, findomain & sigsubfind3r) to increase gathering efficiency and automating the workflow. |
CLI | subfinder | Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing. |
CLI | tmux | tmux is a terminal multiplexer: it enables a number of terminals to be created, accessed, and controlled from a single screen. tmux may be detached from a screen and continue running in the background, then later reattached |
CLI | vim | A highly configurable text editor built to make creating and changing any kind of text very efficient. |
CLI | wappalyzer | Wappalyzer identifies technologies on websites, such as CMS, web frameworks, ecommerce platforms, JavaScript libraries, analytics tools and more. |
CLI | wuzz | Interactive cli tool for HTTP inspection |
Wordlists
Wordlist | Description |
---|---|
SecLists | SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. |
jhaddix / content_discovery_all.txt | a masterlist of content discovery URLs and files (used most commonly with gobuster) |