Skip to content


🏭 Welcome to my forge

💚 Image full credits go to Dirk Hoenes:

MadeWitVSCode MadeWithDocker AutomatedWith AuditedWith


Even though this box is primarily intended for offensive operation, many tools and scripts can also be used for defensive purposes, for example, in CI/CD pipelines as security validation.

📒 Quick access:

🎯 The goal of this image is to provide an, always up to date "box", containing materials (tools + scripts) useful in the context of the assessment of a web-based application: site, API, etc.

📢 The image is based on the alpine base image. Previously, it was based on the kali-rolling image but the final size of the image, once the toolbox was built, was really too heavy (more than 14GB).

📱 Recently, I started to add content for mobile assessment to gather information/tools in a single box.

🏷️ Issues with the label idea, contains general ideas on a project/code/script/payload/research/etc not necessarily directly linked to the toolbox itself. Indeed, as this project is my central toolbox's forge, I used it also to gather/centralize my ideas.

🔋 Health status

Audit the toolbox image

Check cheat sheet links validity

Update scripts index

Update nmap scripts index

Build and deploy the toolbox image

Build PostgreSQL extension

Build DLL Hijacking library

Build Hash Extender linux binary

⚒️ Box enhancement approach



    participant T as Toolbox
    participant P as Param-Miner    
    participant S as SecLists
    participant N as Nuclei templates
    alt Is a missing hidden http parameter/header entry
        T->>P: Propose a PR with the missing element
        P->>T: Get update from the GitHub repository once the PR is merged
    alt Is a missing discovery dictionary entry
        T->>S: Propose a PR with the missing element
        S->>T: Get update from the GitHub repository once the PR is merged
    alt Is a missing detection generic point
        T->>N: Propose a PR with the missing template
        N->>T: Get update from the GitHub repository once the PR is merged
    alt Is a missing useful existing tool
        T->>T: Add the tool in a way to always use the latest version
    alt Is a missing specific need or without existing tool
        T->>T: Add a new custom script

🖥️ IDE VSCode

📚 What does it contain?


The folder build contains utility internal scripts used to build the docker image.


All tools are installed in the folder /tools and a transfer zone between the container and the host has been defined via the folder /tools/reports.

Helper scripts


The index of all the scripts available is automatically updated, at each push on the master branch, via this workflow.

The folder scripts contains helper scripts for some operations using embedded tools.



The trial of the software Foxit PDF Editor can be used to create custom malicious PDF files.

The folder misc contains materials that can be used for testing specific cases like for example when an app is using:


The folder templates contains several scripts/files that can be used, as a basis for custom scripts, to speed-up the implementation of a POC.


The folder dictionaries contains several, home-made custom dictionaries, that can be used for discovery operations.

Technical hints

This file contains several technical hints for different kinds of context/issues/goals.

💻 It's my tailor made cheat sheet.

🔨 Build image locally

Use the following set of commands:

$ git clone
$ cd toolbox-pentest-web
$ docker build . -t righettod/toolbox-pentest-web --file Dockerfile

📑 Container usage

On a docker host for direct access

Native docker on Linux or MacOS

# Create a volume to share files with the container (ex: reports)
$ docker volume create --name shared_space
$ docker volume inspect shared_space
# Run container
$ docker run -v shared_space:/tools/reports -p -i -t righettod/toolbox-pentest-web /bin/zsh
$ docker run -v shared_space:/tools/reports -p -p -i -t righettod/toolbox-pentest-web /bin/zsh
# Build image into local cache
$ docker build -t righettod/toolbox-pentest-web .
# Remove image from local cache
$ docker rmi -f righettod/toolbox-pentest-web

Docker for Windows

rem Run container and defines a shared folder
C:\> docker run -v F:/SharedFolder:/tools/reports -p -i -t righettod/toolbox-pentest-web /bin/zsh

For remote ssh access


Private key to use for SSH authentication is here. This box is intended to be used as a toolbox for a short running period.


When deployed on Kubernetes, the SYS_CHROOT / AUDIT_WRITE / NET_RAW capabilities are required in the security context.

  1. Run the container on the target docker host using the following command line:
$ docker run -p 22:22 righettod/toolbox-pentest-web
Server listening on port 22.
Server listening on :: port 22.
  1. Access the container, via SSH, using the following command:
$ ssh -i ~/.ssh/ssh-private-key.pem root@[DOCKER_HOST_IP]
➜  ~

Add "StrictHostKeyChecking=no" in case of trouble with the remote keys because they are unique for each built image:

$ ssh -o "StrictHostKeyChecking=no" -i ~/.ssh/toolbox-ssh-private-key.pem root@[DOCKER_HOST_IP]
➜  ~

📦 Container registries

Image is published into the following registries, every week, via this workflow:

🛡️ Security

  • Refer here for information about reporting a vulnerability.
  • Image is audited every week, by Snyk and this workflow, to detect presence of any vulnerability.