A Kali-based container for recon and enumeration using JupyterLab hosted on Docker. Jupyter Notebook is an open-source web application that allows you to create and share documents that contain live code, equations, visualizations, and narrative text.
Uses include data cleaning and transformation, numerical simulation, statistical modeling, data visualization, machine learning, and much more.
# update
sudo apt update && sudo apt -y upgrade
# docker
sudo apt install -y docker.io
sudo systemctl enable docker –now
# python
sudo apt install python3
sudo apt install python3-pip
# pip
sudo pip install docker
# chocolatey
Set-ExecutionPolicy Bypass -Scope Process -Force; [System.Net.ServicePointManager]::SecurityProtocol = [System.Net.ServicePointManager]::SecurityProtocol -bor 3072
iex ((New-Object System.Net.WebClient).DownloadString(‘https://community.chocolatey.org/install.ps1’))
# docker
choco install docker-desktop
# python
choco install python3
# pip
py -m pip install docker
curl -sS https://raw.githubusercontent.com/Y2FuZXBh/jupyter-kali/main/build.py | sudo python3 –
(wget -usebasicparsing https://raw.githubusercontent.com/Y2FuZXBh/jupyter-kali/main/build.py).content | python –
sudo docker logs jupyter-kali 2>&1 | grep “http://127.0.0.1” | tail -n 1 | xargs
Please consider following and supporting us to stay updated with the latest info
SpyAI is a sophisticated form of malware that leverages advanced technologies to capture and analyze…
The Proxmark3 is a versatile, open-source tool designed for radio-frequency identification (RFID) security analysis, research,…
The "Awesome Solana Security" collection is a comprehensive resource designed to help developers build more…
The "IngressNightmare" vulnerabilities, disclosed in March 2025, represent a critical set of security issues affecting…
AdaptixC2 is an advanced post-exploitation and adversarial emulation framework designed specifically for penetration testers. It…
Bincrypter is a powerful Linux binary runtime crypter written in BASH. It is designed to…