To better understand this option, let’s take a look at a typical network interfaces list for a host with Docker installed: $ ifconfigĭocker0 Link encap:Ethernet HWaddr 02:42:A7:6A:EC:A9 Make your modfications to the package here cd. Parrotsec/build:lts-armhf - based on parrotsec/core:lts-armhf Parrotsec/build:lts-arm64 - based on parrotsec/core:lts-arm64 Parrotsec/build:lts-i386 - based on parrotsec/core:lts-i386 Parrotsec/build:lts-amd64 - based on parrotsec/core:lts-amd64 Parrotsec/build:rolling-i386 - based on parrotsec/core:rolling-i386 Parrotsec/build:rolling-amd64 - based on parrotsec/core:rolling-amd64 Parrotsec/build:latest - based on parrotsec/core:rolling-amd64 This container ships with the following packages: This container is used internally by the Parrot Build Platform to test and build the distro packages.Įven if it is not meant to be used directly by users, it contains all the tools to work on debian packaging and properly test package builds in clean and disposable environments.
Usage: docker run -rm -ti parrotsec/tools-sqlmap Įxample: docker run -rm -ti parrotsec/tools-sqlmap -u -wizard Usage: docker run -rm -ti parrotsec/tools-bettercap
Usage: docker run -rm -network host -ti -v $PWD/beef:/var/lib/beef-xss parrotsec/tools-beef Usage: docker run -rm -ti -network host -v $PWD/set:/root/.set parrotsec/tools-set Usage: docker run -rm -ti -network host -v $PWD/msf:/root/ parrotsec/tools-metasploitīased on parrotsec/tools-metasploit:latest Usage: docker run -rm -ti parrotsec/tools-nmap Įxamples: docker run -rm -ti parrotsec/tools-nmap -F 192.168.1.1ĭocker run -rm -ti parrotsec/tools-nmap -Pn 89.36.210.176 This is a curated selection of smaller docker containers that contain only specific tools, alone or in cherry-picked collections.Ĭontainers with shared tools are stacked on top of each other (when possible) to minimize storage waste and maximize layers reuse.Īvailable templates: parrotsec/tools-nmap Launch the container: docker run -rm -ti -network host -v $PWD/work:/work parrotsec/security Parrotsec/security:lts - built over parrotsec/core:lts-amd64 Parrotsec/security:rolling - built over parrotsec/core:rolling-amd64 Parrotsec/security:latest - built over parrotsec/core:rolling-amd64 This container ships with the following metapackages: Some tools with graphical interface were excluded for obvious reasons. This container includes a huge collection of tools that can be used via command line from inside a docker container. Launch the container: docker run -rm -ti -network host -v $PWD/work:/work parrotsec/core:lts-amd64 Parrotsec/core:lts-armhf - based on parrot lts (devuan stable) armhf Parrotsec/core:lts-arm64 - based on parrot lts (devuan stable) arm64 Parrotsec/core:lts-i386 - based on parrot lts (devuan stable) i386 Parrotsec/core:lts-amd64 - based on parrot lts (devuan stable) amd64 Parrotsec/core:rolling-i386 - based on parrot rolling (debian testing) i386 Parrotsec/core:rolling-amd64 - based on parrot rolling (debian testing) amd64 Parrotsec/core:latest - based on parrot rolling (debian testing) amd64
You can use it as a start point to create your custom containers.
Whether you want to have a container full of tools, or several smaller containers with a tiny selection of tools, or even a clean Parrot environment to build yor custom stack on, this is the right place where to learn how to take advantage of the Parrot Docker workspace. Skip to usage examples Available Templates Parrot uses docker to allow its users to use its vast arsenal of tools on any platform supported by docker. Docker is a powerful technology that allows users to run containers universally on any host platform.ĭocker uses template images, and allows the user to start several instances of the same template, destroy them, or build new custom templates on top of them.