Cyber security

Vulpes/VulpOS : The Docker-Powered All-in-One Workstation For Penetration Testing And Offsec Labs

All in one Docker-based workstation with hacking tools for Pentesting and offsec Labs by maintained by @Fenrir.pro.

It is based on Alpine Linux, clutter-free, lightweight and actively used for penetration testing assessments, local training sessions, workshops and online classes on hack.courses.

Why?

We deploy on-demain online workstations and needed a hacking-oriented operating system with a small CPU/RAM/storage footprint (smaller than kali and ubuntu at least which took sometimes 20~30 minutes to setup).

Also, being able to deploy a new Linux hacking machine on a Windows workstation in less than 20 seconds is definitely enjoyable.

So here’s Vulpes (also VulpOS, still unsure about the name)!

Quick Setup

You’re On Windows?

PS> docker-compose -f docker-compose-win-novnc.yml up

You’re On A UNIX-Like System?

$> docker-compose -f docker-compose-unix-novnc.yml up

Once your build is done (which takes usually around 10 to 20 seconds) you can enjoy Vulpes in your browser locally on :

Or if you deployed vulpes on a server/remote machine :

http://YOUR_SERVER_IP:8080/?path=YOUR_SERVER_IP:6080

IMPORTANT : This default docker-compose configuration exposes three ports on your machine’s 0.0.0.0 : 8000 (noVNC web interface), 6080 (websockify) and 5900 (VNC).

Make sure you trust machines on your local network if you keep this default configuration and change the default VNC password that is CHANGEME in the docker-compose-win-novnc.yml file.

I repeat : those three services are exposed on your machine’s network interfaces by default!

Screenshots

Current Goals

Default Toolset

  • Wireshark
  • nmap
  • radare2
  • netcat
  • socat
  • john the ripper
Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How to Check if a File Exists in Bash – Simply Explained

Why Do We Check Files in Bash? When writing a Bash script, you often work…

18 hours ago

Bash Arrays Explained Simply: Beginner’s Guide with Examples

If you’re learning Bash scripting, one of the most useful features you’ll come across is…

2 days ago

Bash For Loop Examples Explained Simply for Beginners

If you are new to Bash scripting or Linux shell scripting, one of the most…

2 days ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

4 days ago

ROADTools: The Modern Azure AD Exploration Framework

ROADTools is a powerful framework designed for exploring and interacting with Microsoft Azure Active Directory…

7 days ago

How to Enumerate Microsoft 365 Groups Using PowerShell and Python

Microsoft 365 Groups (also known as M365 Groups or Unified Groups) are at the heart…

7 days ago