Cyber security

Vulpes/VulpOS : The Docker-Powered All-in-One Workstation For Penetration Testing And Offsec Labs

All in one Docker-based workstation with hacking tools for Pentesting and offsec Labs by maintained by @Fenrir.pro.

It is based on Alpine Linux, clutter-free, lightweight and actively used for penetration testing assessments, local training sessions, workshops and online classes on hack.courses.

Why?

We deploy on-demain online workstations and needed a hacking-oriented operating system with a small CPU/RAM/storage footprint (smaller than kali and ubuntu at least which took sometimes 20~30 minutes to setup).

Also, being able to deploy a new Linux hacking machine on a Windows workstation in less than 20 seconds is definitely enjoyable.

So here’s Vulpes (also VulpOS, still unsure about the name)!

Quick Setup

You’re On Windows?

PS> docker-compose -f docker-compose-win-novnc.yml up

You’re On A UNIX-Like System?

$> docker-compose -f docker-compose-unix-novnc.yml up

Once your build is done (which takes usually around 10 to 20 seconds) you can enjoy Vulpes in your browser locally on :

Or if you deployed vulpes on a server/remote machine :

http://YOUR_SERVER_IP:8080/?path=YOUR_SERVER_IP:6080

IMPORTANT : This default docker-compose configuration exposes three ports on your machine’s 0.0.0.0 : 8000 (noVNC web interface), 6080 (websockify) and 5900 (VNC).

Make sure you trust machines on your local network if you keep this default configuration and change the default VNC password that is CHANGEME in the docker-compose-win-novnc.yml file.

I repeat : those three services are exposed on your machine’s network interfaces by default!

Screenshots

Current Goals

Default Toolset

  • Wireshark
  • nmap
  • radare2
  • netcat
  • socat
  • john the ripper
Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

3 hours ago

MODeflattener – Miasm’s OLLVM Deflattener

MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…

3 hours ago

My Awesome List : Tools And Their Functions

"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…

3 hours ago

Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…

3 hours ago

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…

3 hours ago

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…

6 hours ago