-
Notifications
You must be signed in to change notification settings - Fork 440
Expand file tree
/
Copy pathdocker-compose.yml
More file actions
73 lines (70 loc) · 2.01 KB
/
docker-compose.yml
File metadata and controls
73 lines (70 loc) · 2.01 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
services:
pentestagent:
build:
context: .
dockerfile: Dockerfile
container_name: pentestagent
environment:
- OPENAI_API_KEY=${OPENAI_API_KEY}
- ANTHROPIC_API_KEY=${ANTHROPIC_API_KEY}
- PENTESTAGENT_MODEL=${PENTESTAGENT_MODEL}
- PENTESTAGENT_DEBUG=${PENTESTAGENT_DEBUG:-false}
volumes:
- ./loot:/app/loot
networks:
- pentestagent-net
stdin_open: true
tty: true
pentestagent-kali:
build:
context: .
dockerfile: Dockerfile.kali
container_name: pentestagent-kali
privileged: true # Required for VPN and some tools. NOTE: this is risky on shared hosts; prefer running inside a disposable VM.
cap_add:
- NET_ADMIN
- SYS_ADMIN
environment:
- OPENAI_API_KEY=${OPENAI_API_KEY}
- ANTHROPIC_API_KEY=${ANTHROPIC_API_KEY}
- PENTESTAGENT_MODEL=${PENTESTAGENT_MODEL}
- ENABLE_TOR=${ENABLE_TOR:-false}
- INIT_METASPLOIT=${INIT_METASPLOIT:-false}
# By default msfrpcd binds to loopback; to intentionally expose Metasploit RPC to the host
# set EXPOSE_MSF_RPC=true in your environment. This is NOT recommended on shared machines.
- EXPOSE_MSF_RPC=${EXPOSE_MSF_RPC:-false}
volumes:
- ./loot:/app/loot
networks:
- pentestagent-net
stdin_open: true
tty: true
profiles:
- kali
pentestagent-kali-arm64:
build:
context: .
dockerfile: Dockerfile.kali
container_name: pentestagent-kali-arm64
privileged: true
cap_add:
- NET_ADMIN
- SYS_ADMIN
environment:
- OPENAI_API_KEY=${OPENAI_API_KEY}
- ANTHROPIC_API_KEY=${ANTHROPIC_API_KEY}
- PENTESTAGENT_MODEL=${PENTESTAGENT_MODEL}
- ENABLE_TOR=${ENABLE_TOR:-false}
- INIT_METASPLOIT=${INIT_METASPLOIT:-false}
- EXPOSE_MSF_RPC=${EXPOSE_MSF_RPC:-false}
volumes:
- ./loot:/app/loot
networks:
- pentestagent-net
stdin_open: true
tty: true
profiles:
- kali-arm64
networks:
pentestagent-net:
driver: bridge