-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathDockerfile
More file actions
45 lines (33 loc) · 1.26 KB
/
Dockerfile
File metadata and controls
45 lines (33 loc) · 1.26 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
# ExploitGraph - Docker Image
# Usage:
# docker build -t exploitgraph .
# docker run -it exploitgraph # Interactive console
# docker run exploitgraph -t http://target.com --auto # Auto attack
# docker run -v $(pwd)/reports:/app/reports exploitgraph -t http://target.com --auto
FROM python:3.11-slim
LABEL maintainer="prajwal-infosec" \
version="1.0.0" \
description="ExploitGraph - Automated Attack Path Discovery & Exploitation Framework"
# Security: run as non-root
RUN groupadd -r exploitgraph && useradd -r -g exploitgraph -d /app exploitgraph
WORKDIR /app
# Install dependencies first (layer caching)
COPY requirements.txt .
RUN pip install --no-cache-dir -r requirements.txt \
&& pip install --no-cache-dir pyyaml tabulate \
&& rm -rf /root/.cache/pip
# Copy application
COPY --chown=exploitgraph:exploitgraph . .
# Create runtime directories
RUN mkdir -p sessions logs reports \
&& chown -R exploitgraph:exploitgraph /app
# Switch to non-root
USER exploitgraph
# Verify it loads
RUN python3 exploitgraph.py --list-modules > /dev/null
ENTRYPOINT ["python3", "exploitgraph.py"]
CMD ["--help"]
# Expose Web UI port
EXPOSE 7331
# Mount points for persistence
VOLUME ["/app/reports", "/app/sessions", "/app/logs"]