Cyber security

Vulpes/VulpOS : The Docker-Powered All-in-One Workstation For Penetration Testing And Offsec Labs

All in one Docker-based workstation with hacking tools for Pentesting and offsec Labs by maintained by @Fenrir.pro.

It is based on Alpine Linux, clutter-free, lightweight and actively used for penetration testing assessments, local training sessions, workshops and online classes on hack.courses.

Why?

We deploy on-demain online workstations and needed a hacking-oriented operating system with a small CPU/RAM/storage footprint (smaller than kali and ubuntu at least which took sometimes 20~30 minutes to setup).

Also, being able to deploy a new Linux hacking machine on a Windows workstation in less than 20 seconds is definitely enjoyable.

So here’s Vulpes (also VulpOS, still unsure about the name)!

Quick Setup

You’re On Windows?

PS> docker-compose -f docker-compose-win-novnc.yml up

You’re On A UNIX-Like System?

$> docker-compose -f docker-compose-unix-novnc.yml up

Once your build is done (which takes usually around 10 to 20 seconds) you can enjoy Vulpes in your browser locally on :

Or if you deployed vulpes on a server/remote machine :

http://YOUR_SERVER_IP:8080/?path=YOUR_SERVER_IP:6080

IMPORTANT : This default docker-compose configuration exposes three ports on your machine’s 0.0.0.0 : 8000 (noVNC web interface), 6080 (websockify) and 5900 (VNC).

Make sure you trust machines on your local network if you keep this default configuration and change the default VNC password that is CHANGEME in the docker-compose-win-novnc.yml file.

I repeat : those three services are exposed on your machine’s network interfaces by default!

Screenshots

Current Goals

Default Toolset

  • Wireshark
  • nmap
  • radare2
  • netcat
  • socat
  • john the ripper
Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

1 day ago

This Android Bug Can Crack Your Lock Screen in 60 Seconds

A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

5 days ago

How to Fix MyISAM Table Corruption in MySQL?

In MySQL Server 5.5 and earlier versions, the MyISAM was the default storage engine. So,…

6 days ago

Microsoft Authenticator Flaw Could Leak Login Codes

A newly disclosed vulnerability in Microsoft Authenticator could expose one time sign in codes or…

6 days ago

Modrinth – A Comprehensive Overview of Tools and Functions

Modrinth is a modern platform that’s rapidly changing the landscape of Minecraft modding, providing an…

7 days ago

BlackSanta Malware A Stealthy Threat Targeting Recruiters and HR Teams

A new, highly sophisticated malware campaign named BlackSanta has emerged, primarily targeting HR and recruitment…

7 days ago