docker-explorer
mtsc
docker-explorer | mtsc | |
---|---|---|
2 | 1 | |
515 | 1 | |
1.0% | - | |
3.8 | 0.0 | |
10 months ago | about 6 years ago | |
Python | Perl | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
docker-explorer
- ISO Docker IR Resources
-
Reverse Engineering a Docker Image
Google forensic team also maintain an Docker introspection tool : https://github.com/google/Docker-Explorer
mtsc
-
Reverse Engineering a Docker Image
Obligatory self promotion: https://github.com/nanoscopic/mtsc
It is a tool I created myself for figuring out the contents of layered docker images.
It does these things:
1. Compares two docker images to see exact file differences
2. Diffs the contents of two directory structures
3. Views contents of a docker image without mounting it or using docker itself
4. Generates a standalone index of the contents of a docker image
5. Determines the resultant layer composition of a directory within a docker image
6. Extracts a specific pathed file from a layered docker image
It is extremely helpful when trying to determine the exact differences between two different builds of the same Dockerfile.
What are some alternatives?
Whaler - Program to reverse Docker images into Dockerfiles
kube-forensics
dive - A tool for exploring each layer in a docker image
lazydocker - The lazier way to manage everything docker
docker-fs - Mount your docker container FS into a local directory
prettier - Dockernized prettier. This is an opinionated code formatter.
toolkit - A toolkit for the post-mortem examination of Docker containers from forensic HDD copies
mac_apt - macOS (& ios) Artifact Parsing Tool