Skip to content

Nightingale Docker for Pentesters is a comprehensive Dockerized environment tailored for penetration testing and vulnerability assessment. It comes preconfigured with all essential tools and utilities required for efficient Vulnerability Assessment and Penetration Testing (VAPT), streamlining the setup process for security professionals.

License

Notifications You must be signed in to change notification settings

RAJANAGORI/Nightingale

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Nightingale: Docker for Pentesters

Nightingale Logo


Nighitngale GUI

Untitled.design.mp4

Nightingale Wiki for GUI installation

Badges

Project and CI/CD

OpenSSF Best Practices OWASP Incubator
Docker Image CI
Multi OS Docker Images - ARM64 macOS
Artifact Hub
Trivy Scan


Social and Profiles

Follow on LinkedIn
Follow on Twitter
Profile Views
Medium Badge

Conferences

  • Blackhat Arsenal ASIA 2022
  • OWASP Global AppSec EU 2022
  • Docker community hands-on event
  • Blackhat Arsenal MEA 2022 (Shortlisted)
  • Blackhat Arsenal ASIA 2023
  • Blackhat Arsenal MEA 2023 (Shortlisted)
  • Blackhat Arsenal Asia 2024
  • IWCON - 2023
  • c0c0n - 2024

Docker for Pentesters

Description

In today's technological era, Docker is the most powerful technology across various domains, whether it's Development, Cybersecurity, DevOps, Automation, or Infrastructure.

Considering the demand of the industry, I would like to introduce my idea to create NIGHTINGALE: a Docker image for pentesters.

This Docker image provides a ready-to-use environment with the tools required for pentesting across different scopes, including web application penetration testing, network penetration testing, mobile, API, OSINT, or Forensics.

The best part is that you can either create an altered Docker image or pull the pre-built Docker image from the hub.

Some of the best features are listed below; I would highly recommend going through them before starting to penetrate the application. Link to access tool list: (tool list)

Pros

  • Pre-installed penetration testing tools and frameworks
  • Consistent and repeatable testing environments via Docker
  • Fast booting and tearing down of testing environments
  • Resource-efficient operation suitable for users with limited resources
  • Browser-based access using the local IP address
  • Platform independence, enhancing accessibility and usability
  • Go binary support for deploying Nightingale on any architecture.
  • Compatibility with both AMD and ARM architectures.
  • C/CD integration for automated vulnerability scanning.
  • Maintenance of GitHub Advisories, ensuring consumers have access to the latest images.
  • On-demand installation via a request form, allowing consumers to request specific tools.
  • GUI based solution for those who has love-hate relation with CLI.

Why?

The reason behind creating this Docker image is to make a platform-independent penetration toolkit. It includes all the useful tools that a penetration tester might need (refer to the tool list section for details).

Please feel free to contribute to the tool.

For more information Nightingale Wiki

Nightingale OWASP Project Here

About

Nightingale Docker for Pentesters is a comprehensive Dockerized environment tailored for penetration testing and vulnerability assessment. It comes preconfigured with all essential tools and utilities required for efficient Vulnerability Assessment and Penetration Testing (VAPT), streamlining the setup process for security professionals.

Topics

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Packages

 
 
 

Contributors 9