An amazing bug bounty toolkit for Docker.
It is obvious that this tool MUST NOT be used in a malicious context. It should only be used against your own machine or with the consent of the owner of the targeted machine. The author of Koala can in no way be held responsible for any malicious and unauthorized use of this script.
- A Unix-like operating system: macOS, Linux, BSD. On Windows: WSL is preferred, but cygwin or msys also mostly work.
- Docker should be installed. If is not installed, check the following instructions here: Docker Install
git clone https://github.com/tun43p/koala.git
cd koala/bin/
chmod +x install.sh
./install.sh
koala
: Run Koala Toolkit
koala -b
: Build
koala -e
: Edit Dockerfile
koala -h
: Print help
koala -k
: Kill containers
koala -r
: Remove containers
koala -R
: Remove containers and image
koala -u
: Upgrade Koala
koala -uninstall
: Uninstall Koala
koala -v
: Print current version
- altdns
- aircrack-ng
- amass
- awscli
- commix
- curl
- dmitry
- dnsenim
- dnsutils
- exploitdb
- exploitdb-bin-sploits
- ftp
- gcc
- hashcat
- hydra
- john
- libldns-dev
- make
- masscan
- massdns
- metasploit-framework
- net-tools
- nikto
- netcat
- nmap
- php
- python3
- python-pip
- python3-pip
- recon-ng
- responder
- seclists
- sublist3r
- sqlmap
- teh_s3_bucketeers
- unicorn
- vim
- wfuzz
- wget
- whois
- wpscan
- wordlists
- xsstrike
1.0.2
tun43p - Initial work - tun43p.
This project is licensed under the MIT License, see the LICENCE file for details.