Automated Pentest

Minimal docker container of Parrot OS for running an automated scan & pentest report.
Alternatives To Automated Pentest
Project NameStarsDownloadsRepos Using ThisPackages Using ThisMost Recent CommitTotal ReleasesLatest ReleaseOpen IssuesLicenseLanguage
2 days ago40mitDockerfile
Docker official jenkins repo
Docker Gc5,108
2 years ago23apache-2.0Shell
INACTIVE: Docker garbage collection of containers and images
Kubernetes Handbook4,980
3 days agootherMakefile
Kubernetes Handbook (Kubernetes指南)
18 hours ago395agpl-3.0Shell
⛴ Docker image of Nextcloud
Docker Airflow3,589
2 months ago269apache-2.0Shell
Docker Apache Airflow
Docker Openldap3,176
a year ago302mitShell
A docker image to run OpenLDAP 🐳
3 years agomit
🐋 Docker Cheat Sheet 🐋
23 days ago13November 19, 202131mitGo
dry - A Docker manager for the terminal @
7 days ago150epl-1.0Clojure
Lightweight mobile-friendly Docker Swarm management UI
a year ago1March 03, 202111mitGo
TUI Client for Docker
Alternatives To Automated Pentest
Select To Compare

Alternative Project Comparisons
Build Status
Build and Push to Dockerhub


Creating a minimal docker container of Parrot OS for running an automated scan report.

This docker container can be used for auditing all standard security assessment for you.

There are more than 20 Modules has been Integrated with in the container which can be used for automated pentest.

Number Of Modules

  • Whois domain analyzer
  • Nslookup
  • Nmap
  • Uniscan
  • TheHarvester
  • Metagoofil
  • Dirb
  • DNSRecon
  • DNSmap
  • Wafw00f
  • Nikto
  • XssPy
  • XSStrike
  • WhatWeb
  • Wapiti
  • WPscan
  • Joomscan
  • Droopescan ( CMS Vulnerability Scanner WordPress, Joomla, Silverstripe, Drupal, And Moodle)
  • SSLScan
  • SSLyze
  • A2SV
  • WFuzz


  • Intel-Gathering
  • Vulnerability Analysis
  • Security Auditing
  • System Enumeration
  • Fuzzing
  • CMS Auditing
  • SSL Security Auditing
  • WAF Auditing
  • Intel-Gathering
  • On top of that, you can install your own packages, please check this repo

How to run it

Create a docker volume to store your automated pentest reports

▶ docker volume create pentest-reports

Download it from Dockerhub and run it on your system

▶ docker run -d --name pentest -d -v pentest-reports:/src vishnunair/pentest:latest

Or run the below commands if you want to play around with docker container in your local machine:

▶ git clone && cd automated-pentest &&
  docker build -t=localhost/pentest . &&
  docker run -d --name pentest -d -v pentest-reports:/src -it localhost/pentest

Execute the pentest script inside the container like below:

▶ docker exec -it pentest bash

┌─[[email protected]]─[/src]
└──╼ #./ --help

Usage: sh [OPTION]...
  -d, --domain   Provide your DOMAIN domain.
  -h, --help     Display help file

┌─[[email protected]]─[/src]
└──╼ #./ -d

All the reports can be seen in /src inside the container however you can also access it from your local machine.

If your docker host is Linux, you can find Docker volumes by /var/lib/docker/volumes path.

▶ docker volume inspect pentest-reports

However if you're using MacOs. Try to cd /var/lib/docker/volumes from your MacOS terminal, and you'll get nothing. You see, your Mac machine isn't a real Docker host.

So execute the below script to access the reports from your local machine path ~/Documents/ and you can use any browser to view the reports:

▶ bash ./

Check your ~/Documents/src folder for the reports

Legal disclaimer:

Usage of this automated pentest for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program. Only use for educational purposes.

Popular Docker Projects
Popular Volume Projects
Popular Virtualization Categories
Related Searches

Get A Weekly Email With Trending Projects For These Categories
No Spam. Unsubscribe easily at any time.
Docker Container
Penetration Testing