Legal Notice: This repository and all included services are provided strictly for defensive security research and education on assets you own or have explicit written authorization to test. Do not deploy or use these tools against networks or data without permission.
kali-suite is a monorepo that packages eight lab-oriented, defensive services for analyzing pre-collected security artifacts. Each service is isolated, Docker-ready, and deployable to Render via the supplied Blueprint. All tooling operates in read-only or dry-run modes by default—no active or unauthorized scanning is performed.
.
├── README.md
├── render.yaml
├── docker-compose.yaml
├── .gitignore
├── scripts/
│ └── local_build.sh
└── services/
├── nmap-report/
├── pcap-explorer/
├── lab-deployer/
├── recon-pipeline/
├── siem-adapter/
├── vuln-ticketer/
├── teaching-notebook/
└── gui-wrapper/
Each service folder contains an application, container configuration, requirements, and service-specific README with legal and operational guidance.
-
Ensure Docker and Docker Compose are installed.
-
Execute the bundled helper script:
./scripts/local_build.sh
This builds all service images and runs the suite via
docker compose. Source folders are mounted for live editing. -
Visit the service endpoints (default network
kali_suite_net) at the ports defined indocker-compose.yaml.
To stop the stack:
docker compose down- Push this repository to your own GitHub account.
- In Render, create a new Blueprint and point it at the repo.
- Review and adjust environment variables for services requiring secrets:
siem-adapter:WEBHOOK_URL,DRY_RUNvuln-ticketer:GITHUB_TOKEN,DRY_RUN
- Deploy the Blueprint; Render will provision each Docker-based web service using the respective folders.
All services operate in simulated or dry-run mode unless explicitly configured otherwise:
siem-adapterposts to webhooks only whenDRY_RUN=falseandWEBHOOK_URLis provided.vuln-ticketeronly creates live GitHub issues whenDRY_RUN=falseand a validGITHUB_TOKENis supplied; otherwise it writes to a local JSON ticket log.lab-deployerproduces offline Vagrant/Ansible bundles and never launches VMs on the server.- Artifact-processing services (
nmap-report,pcap-explorer,recon-pipeline) accept pre-generated files and merely parse, normalize, or visualize them.
Always confirm that uploaded files and lab deployments belong to environments you are authorized to inspect.
Contributions should maintain the defensive, authorization-first philosophy of this suite. Do not add functionality that initiates network scans or offensive actions.