A Kali-based container for recon and enumeration using JupyterLab hosted on Docker. Jupyter Notebook is an open-source web application that allows you to create and share documents that contain live code, equations, visualizations, and narrative text.
Uses include data cleaning and transformation, numerical simulation, statistical modeling, data visualization, machine learning, and much more.
# update
sudo apt update && sudo apt -y upgrade
# docker
sudo apt install -y docker.io
sudo systemctl enable docker –now
# python
sudo apt install python3
sudo apt install python3-pip
# pip
sudo pip install docker
# chocolatey
Set-ExecutionPolicy Bypass -Scope Process -Force; [System.Net.ServicePointManager]::SecurityProtocol = [System.Net.ServicePointManager]::SecurityProtocol -bor 3072
iex ((New-Object System.Net.WebClient).DownloadString(‘https://community.chocolatey.org/install.ps1’))
# docker
choco install docker-desktop
# python
choco install python3
# pip
py -m pip install docker
curl -sS https://raw.githubusercontent.com/Y2FuZXBh/jupyter-kali/main/build.py | sudo python3 –
(wget -usebasicparsing https://raw.githubusercontent.com/Y2FuZXBh/jupyter-kali/main/build.py).content | python –
sudo docker logs jupyter-kali 2>&1 | grep “http://127.0.0.1” | tail -n 1 | xargs
Please consider following and supporting us to stay updated with the latest info
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…
A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…