Dockerized penetration testing tools for quick deployment: remote nmap execution via WMI and an AI-assisted Kali Linux command interface.
Execute nmap scans on remote Windows machines via WMI (Windows Management Instrumentation) using Impacket.
cd impacket-nmap
docker build -t impacket-nmap .
docker run impacket-nmap python remote_nmap_executor.py -t TARGET -u USER -p PASS --port 445Use case: Run nmap from inside the target network through a compromised Windows host.
Web-based interface that combines nmap scanning, Metasploit automation, and AI-powered risk analysis. Enter a target, get automated reconnaissance with intelligent risk assessment.
cd kali-prompt
docker build -t kali-prompt .
docker run -p 5000:5000 kali-promptFeatures:
- Automated nmap scanning with configurable options
- Metasploit integration for vulnerability exploitation
- AI-powered risk analysis of scan results
- Web UI for easy interaction
# For AI-powered analysis
export OPENAI_API_KEY="your-api-key"pentest-docker-tools/
├── impacket-nmap/
│ ├── Dockerfile
│ └── remote_nmap_executor.py
└── kali-prompt/
├── Dockerfile
├── app.py
├── requirements.txt
└── templates/
└── index.html
For authorized penetration testing only. Only use against systems you have explicit written permission to test.
MIT