Whaler
docker-explorer
Our great sponsors
Whaler | docker-explorer | |
---|---|---|
4 | 2 | |
1,016 | 514 | |
- | 1.4% | |
0.0 | 3.8 | |
almost 2 years ago | 9 months ago | |
Go | Python | |
GNU General Public License v3.0 only | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Whaler
-
Any Way To See The Dockerfile Used To Make An Image On Dockerhub?
Whaler may help you: https://github.com/P3GLEG/Whaler
-
Reverse Image
https://github.com/P3GLEG/Whaler <-- that should do what you're looking for. It depends on the image having been generated using a standard Dockerfile approach, but that should work for most images.
-
Scanning Millions Of Publicly Exposed Docker Containers - Thousands Of Secrets Leaked
3) Specific tooling. Tools like whaler will automate the process of pulling the Dockerfile contents out of an image file.
-
Reverse Engineering a Docker Image
In addition to Dive, there's also Whaler https://github.com/P3GLEG/Whaler which will print out a Dockerfile from the image, based on the metadata in the image.
You can also use Portainer https://www.portainer.io/ which will show the image layer details in the images section.
docker-explorer
- ISO Docker IR Resources
-
Reverse Engineering a Docker Image
Google forensic team also maintain an Docker introspection tool : https://github.com/google/Docker-Explorer
What are some alternatives?
Portainer - Making Docker and Kubernetes management easy.
kube-forensics
lazydocker - The lazier way to manage everything docker
dive - A tool for exploring each layer in a docker image
docker-fs - Mount your docker container FS into a local directory
Docker Compose - Define and run multi-container applications with Docker
toolkit - A toolkit for the post-mortem examination of Docker containers from forensic HDD copies
weakpass - Weakpass collection of tools for bruteforce and hashcracking
mtsc - MTree SCanner
self-hosted-docker-registry - Minimal and lightweight self hosted Docker registry
mac_apt - macOS (& ios) Artifact Parsing Tool