- Blackhat Arsenal ASIA 2022
- OWASP Global AppSec EU 2022
- Docker community hands-on event
- Blackhat Arsenal MEA 2022 (Shortlisted)
- Blackhat Arsenal ASIA 2023
- Blackhat Arsenal MEA 2023 (Shortlisted)
- Blackhat Arsenal Asia 2024
- IWCON - 2023
- c0c0n - 2024
==================================================
In today's technological era, Docker is the most powerful technology across various domains, whether it's Development, Cybersecurity, DevOps, Automation, or Infrastructure.
Considering the demand of the industry, I would like to introduce my idea to create NIGHTINGALE: a Docker image for pentesters.
This Docker image provides a ready-to-use environment with the tools required for pentesting across different scopes, including web application penetration testing, network penetration testing, mobile, API, OSINT, or Forensics.
The best part is that you can either create an altered Docker image or pull the pre-built Docker image from the hub.
Some of the best features are listed below; I would highly recommend going through them before starting to penetrate the application. Link to access tool list: (tool list)
- No need to install multiple programming language supports and modules.
- The booting process is very fast due to the virtualization concept.
- Uses resources from the host machine as needed.
- All pre-installed tools are ready, and you can install new software or tools if required.
- You can perform vulnerability assessments and penetration testing on any scope.
- You can access this Docker container via a browser by calling your local address.
The reason behind creating this Docker image is to make a platform-independent penetration toolkit. It includes all the useful tools that a penetration tester might need (refer to the tool list section for details).
Please feel free to contribute to the tool.
For more information Nightingale Wiki