Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
Here you can share your experience with the project you are suggesting or its comparison with houdini. Optional.
A valid email to send you a verification link when necessary or log in.