Welcome to the Hack The Box setup guide! This repository contains a Docker setup to create a custom Kali Linux environment tailored for penetration testing and red teaming activities. This environment is specifically designed for HTB write-ups and other related tasks.
This project provides a Dockerized Kali Linux environment configured with essential tools for penetration testing. The environment includes tools for enumeration, exploitation, and post-exploitation, making it ideal for HTB write-ups and similar activities.
- Pre-configured Kali Linux environment
- Includes essential penetration testing tools
- Dockerized for easy setup and teardown
- Custom scripts and aliases for convenience
- Docker
- Docker Compose
-
Clone the repository:
git clone https://github.com/Occhima/hackthebox-setup.git cd hackthebox-setup -
Build and start the Docker container:
docker-compose up --build -d
-
Access the running container:
docker exec -it kali-container /bin/bash
The environment includes a virtual environment for pwncat-cs. To use it, run the following alias:
runpwncatTo serve files via HTTP from the /home/htb directory in the container, navigate to the directory and run:
cd /home/htb
python3 -m http.server 80Use tools like netcat or any other available in the Kali Linux container. For example:
nc -lvnp 4444- pdtm: ProjectDiscovery Tools Manager
- Searchsploit: Exploit Database
- Seclists: Security test data
- Dirsearch: Web path scanner
- Gobuster: Directory/File & DNS busting tool
- pwncat-cs: Post-exploitation tool
Contributions are welcome! Please feel free to submit a Pull Request or open an Issue to improve this project.
- Use python-pipx to install python apps in isolated envs
This project is licensed under the MIT License. See the LICENSE file for details.