Bash-based Docker lab launcher for offensive security practice
OctoRig spins up and tears down intentionally vulnerable Docker environments for penetration testing practice, security research, and tool testing — with a single command.
git clone https://github.com/CommonHuman-Lab/OctoRig.git
cd OctoRig
./octorig.shOr non-interactively:
./octorig.sh start 1 # Start a specific lab
./octorig.sh start all # Start all labs
./octorig.sh status # Show running labs
./octorig.sh stop all # Tear everything down| ID | Name | Description | Port(s) |
|---|---|---|---|
| 1 | Juice Shop | OWASP Top 10 + 82 challenges | 3000 |
| 2 | DVWA | Classic PHP/MySQL vulnerable app | 8080 |
| 3 | Metasploitable2 | Linux VM with intentionally vulnerable services | 8081, 2222, 445… |
| 4 | WebGoat | Lesson-based Java security training | 8888 |
| 5 | HTB Style | CTFd scoreboard + Struts2 CVE-2017-5638 | 8000, 8090 |
| 6 | VulnAD | Vulnerable Active Directory via Samba4 | 389, 88, 4445 |
- Docker (daemon running)
- Bash 4.0+
nc(netcat)- Internet access on first run (image pulls)
OctoRig is intended for use in isolated lab environments only.
- Run on a dedicated machine or VM — never expose lab containers to a public network
- All labs contain intentionally vulnerable software — treat accordingly
