This repository contains a collection of VS Code Development Containers (devcontainers) tailored for cybersecurity and red team operations. Each devcontainer provides a pre-configured development environment with all necessary tools and dependencies.
| Container | Base Image | Primary Use Case | Key Tools | Capabilities |
|---|---|---|---|---|
| 🐉 Kali | kalilinux/kali-rolling |
Penetration Testing | nmap, metasploit, burpsuite, nuclei | NET_ADMIN, NET_RAW, SYS_ADMIN capabilities |
| 🎯 RedTeam | mcr.microsoft.com/devcontainers/base:debian-12 |
Red Team Operations | .NET tools, Terraform, PowerShell | Cloud infrastructure, X11 forwarding |
| 🏛️ Athena | ubuntu:24.04 |
Mythic C2 Agent Development | .NET SDK, Python 3.12, donut, Obfuscar | Cross-compilation (ARM64/Windows) |
Path: kali/
Base Image: kalilinux/kali-rolling:latest
Comprehensive penetration testing environment with Kali Linux metapackages and advanced security tools. This container provides:
-
Kali Metapackages:
kali-tools-top10- Essential penetration testing toolskali-tools-web- Web application security testingkali-tools-information-gathering- Reconnaissance toolskali-tools-vulnerability- Vulnerability assessmentkali-tools-exploitation- Exploitation frameworkskali-tools-post-exploitation- Post-exploitation utilitieskali-tools-passwords- Password cracking toolskali-tools-wireless- Wireless security testing
-
Network Assessment Tools:
nmap,masscan- Network discovery and port scanningnikto,gobuster,dirbuster,wfuzz- Web enumerationsqlmap- Automated SQL injection testingburpsuite,zaproxy- Web application security proxieswireshark,tcpdump- Network traffic analysis
-
Advanced Frameworks:
metasploit-framework- Exploitation frameworkimpacket-scripts- Windows protocol implementationscrackmapexec- Active Directory assessmentbloodhound+neo4j- Active Directory attack path analysisbeef-xss- Browser exploitation framework
-
Password/Hash Cracking:
john,hashcat- Password cracking suiteshydra,medusa- Network service brute forcing
-
Go-based Reconnaissance:
subfinder,amass- Subdomain enumerationhttpx- HTTP probing and analysisnuclei- Vulnerability scanner with templates
-
Python Security Libraries:
scapy,python-nmap,pwntools- Security automationselenium- Web automation for testingparamiko- SSH implementationshodan,censys- Internet-wide scanning APIs
Container Capabilities: Runs with NET_ADMIN, NET_RAW, and SYS_ADMIN capabilities for comprehensive network testing.
Forwarded Ports:
8000- Simple HTTP server4444- Metasploit default listener6633- Additional proxy port
VS Code Extensions: Python, Debugpy, Hex Editor, PowerShell, YAML, Jupyter, and JSON support.
Use Case: Comprehensive penetration testing, vulnerability assessments, and security research in an isolated environment with full Kali Linux toolset.
Note: All packages and tools are installed automatically via the setup script on the first run of the devcontainer. This may take several minutes.
Path: redteam/
Base Image: mcr.microsoft.com/devcontainers/base:debian-12
Advanced red team operations environment with cloud infrastructure and development tools. This container includes:
-
Development Frameworks:
- .NET SDK 8.0.407, 9.0.300, and 3.0.103 - Multi-version .NET development
- PowerShell Core - Cross-platform PowerShell automation
- Python 3 with virtual environment (
/work/venv) - Isolated Python development - Cross-compilation toolchain (
gcc-mingw-w64, ARM64 support)
-
.NET Reverse Engineering Tools:
ilspycmd(v9.1.0.7988) - Command-line IL decompilerdotnet-ildasm- IL disassemblerdotnet-ilrepack- Assembly merging utilitydotnet-outdated-tool- Dependency analysisObfuscar.GlobalTool- Code obfuscation
-
Infrastructure & Cloud Tools:
terraform(v1.9.6) - Infrastructure as Code with signature verificationgcloud- Google Cloud Platform CLIgh- GitHub CLI for repository operations- SSH key management with workspace integration
-
Security Libraries:
pycryptodome- Advanced cryptographic operations- Network utilities (
iputils-ping,bind9-dnsutils) - File analysis tools (
file,unzip)
-
Container Capabilities:
- X11 forwarding support (
DISPLAYenvironment) - Docker socket mounting for containerized operations
- SSH key mounting from host system
- Workspace persistence at
/work
- X11 forwarding support (
VS Code Extensions: Comprehensive suite including C# DevKit, PowerShell, Azure CLI, Docker, Terraform, and Markdown tools.
Use Case: Advanced red team exercises, cloud infrastructure assessment, .NET application security testing, and adversarial simulation with development capabilities.
Path: athena/
Base Image: ubuntu:24.04
Development environment for the Athena agent within the Mythic C2 framework. This container includes:
-
Language Support:
- Python 3.12 with development headers (
python3.12-dev) - .NET SDK 8.0.403 and 9.0.300 with cross-platform support
- Go build tools and cross-compilation support
- Python 3.12 with development headers (
-
Security/C2 Development Tools:
pycryptodome- Advanced cryptographic operationsmythic-container- Mythic C2 framework integrationpefile- PE file analysis and manipulationdonut(v2.0.0) - Shellcode generation with ARM64 supportObfuscar.GlobalTool- .NET obfuscation capabilities
-
Cross-compilation Support:
gcc-mingw-w64- Windows cross-compilationbinutils-aarch64-linux-gnu- ARM64 toolchainlibc-dev-arm64-cross- ARM64 development libraries
-
Build Tools:
protobuf-compiler- Protocol buffer compilation- Complete build toolchain (
build-essential,make,gcc)
Use Case: Developing, testing, and customizing Athena payloads for the Mythic Command & Control framework with multi-architecture support.
-
Clone this repository:
git clone <repository-url> cd devcontainers
-
Open the desired container folder in VS Code:
code athena/ # For Athena development code kali/ # For penetration testing code redteam/ # For red team operations
-
When prompted, click "Reopen in Container" or use the command palette:
- Press
Ctrl+Shift+P(orCmd+Shift+Pon Mac) - Type "Dev Containers: Reopen in Container"
- Select the command
- Press
-
VS Code will build and start the devcontainer with all pre-configured tools and settings.
Each container follows the standard devcontainer structure:
container-name/
├── .devcontainer/
│ ├── devcontainer.json # Container configuration
│ ├── Dockerfile # Container image definition
│ └── docker-compose.yml # Multi-service setup (if needed)
└── [additional files] # Container-specific resources
Please review the devcontainer configurations before use to ensure they meet your security and environment requirements.
This project is licensed under the MIT License - see the LICENSE file for details.
Contributions are welcome! Please feel free to submit issues, feature requests, or pull requests to improve these devcontainer configurations.