Docker images
Docker is a powerful technology that allows users to run containers universally on any host platform.
Docker uses template images, and allows the user to start several instances of the same template, destroy them, or build new custom templates on top of them.
Parrot uses docker to allow its users to use its vast arsenal of tools on any platform supported by docker.
Available Templates
Whether you want to have a container full of tools, or several smaller containers with a tiny selection of tools, or even a clean Parrot environment to build yor custom stack on, this is the right place where to learn how to take advantage of the Parrot Docker workspace.
parrotsec/core
Core system with just the Parrot basics. You can use it as a start point to create your custom containers.
This image is multiarch, and works for amd64, arm64 and armhf architectures
launch the container:
docker run --rm -ti --network host -v $PWD/work:/work parrotsec/core
parrotsec/security
This container includes a huge collection of tools that can be used via command line from inside a docker container.
Some tools with graphical interface were excluded for obvious reasons.
This container ships with the following metapackages:
- parrot-cloud
Launch the container:
docker run --rm -ti --network host -v $PWD/work:/work parrotsec/security
Individual Parrot Tools
This is a curated selection of smaller docker containers that contain only specific tools, alone or in cherry-picked collections.
Containers with shared tools are stacked on top of each other (when possible) to minimize storage waste and maximize layers reuse.
available templates:
parrotsec/nmap
based on parrot.run/core provides the following packages:
- nmap
- ncat
- ndiff
- dnsutils
- netcat
- telnet
usage:
docker run --rm -ti parrotsec/nmap <nmap options>
examples:
docker run --rm -ti parrotsec/nmap -F 192.168.1.1
docker run --rm -ti parrotsec/nmap -Pn 89.36.210.176
parrotsec/metasploit
based on parrot.run/nmap:latest provides the following packages:
- nmap
- metasploit-framework
- postgresql
usage:
docker run --rm -ti --network host -v $PWD/msf:/root/ parrotsec/metasploi
parrotsec/set
based on parrot.run/metasploit:latest provides the following packages:
- set
usage:
docker run --rm -ti --network host -v $PWD/set:/root/.set parrotsec/set
parrotsec/beef
based on parrot.run/core provides the following packages:
- beef-xss
usage:
docker run --rm --network host -ti -v $PWD/beef:/var/lib/beef-xss parrotsec/beef
parrotsec/bettercap
based on parrot.run/nmap provides the following packages:
- bettercap
usage:
docker run --rm -ti --network host parrotsec/bettercap
parrotsec/sqlmap
based on parrot.run/nmap provides the following packages:
- sqlmap
usage:
docker run --rm -ti parrotsec/sqlmap <sqlmap options>
example:
docker run --rm -ti parrotsec/sqlmap -u parrotsec.org --wizard