
:/work -w /work vxcontrol/kali-linux bash
bash# Network scanning with proper capabilities docker run --rm --net=host --cap-add NET_ADMIN --cap-add NET_RAW \ vxcontrol/kali-linux nmap -sS -O example.com
bash# Web application testing docker run --rm -v $(pwd):/data -w /data \ vxcontrol/kali-linux sqlmap -u "http://example.com/page?id=1"
bash# Vulnerability scanning with results export docker run --rm -v $(pwd)/results:/results \ vxcontrol/kali-linux nuclei -u example.com -o /results/vulns.json
bash# Subdomain enumeration docker run --rm -v $(pwd):/output \ vxcontrol/kali-linux subfinder -d example.com -o /output/subdomains.txt
bash# Directory brute-forcing docker run --rm -v $(pwd)/results:/results \ vxcontrol/kali-linux gobuster dir -u http://example.com \ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt \ -o /results/directories.txt
yaml# docker-compose.yml services: security-scan: image: vxcontrol/kali-linux volumes: - ./reports:/results - ./targets.txt:/targets.txt command: | bash -c " nuclei -l /targets.txt -o /results/vulnerabilities.json subfinder -dL /targets.txt -o /results/subdomains.txt "
Add these aliases to your shell profile (.bashrc, .zshrc) for instant access to tools:
bash# Network scanning alias nmap='docker run --rm --net=host --cap-add NET_ADMIN --cap-add NET_RAW vxcontrol/kali-linux nmap' alias masscan='docker run --rm --net=host --cap-add NET_ADMIN --cap-add NET_RAW vxcontrol/kali-linux masscan' alias naabu='docker run --rm --net=host --cap-add NET_ADMIN --cap-add NET_RAW vxcontrol/kali-linux naabu' # Web application testing alias nuclei='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux nuclei' alias sqlmap='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux sqlmap' alias gobuster='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux gobuster' alias ffuf='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux ffuf' alias nikto='docker run --rm --net=host -v $(pwd):/work -w /work vxcontrol/kali-linux nikto' # Reconnaissance alias subfinder='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux subfinder' alias httpx='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux httpx' alias amass='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux amass' alias katana='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux katana' # Windows/AD testing alias crackmapexec='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux crackmapexec' alias evil-winrm='docker run --rm -it -v $(pwd):/work -w /work vxcontrol/kali-linux evil-winrm' alias impacket-secretsdump='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux impacket-secretsdump' # Password cracking alias hashcat='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux hashcat' alias john='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux john' alias hydra='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux hydra' # Metasploit alias msfconsole='docker run --rm -it --net=host -v ~/.msf4:/root/.msf4 -v $(pwd):/work -w /work vxcontrol/kali-linux msfconsole' alias msfvenom='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux msfvenom' # Interactive shell alias kali-shell='docker run --rm -it -v $(pwd):/work -w /work --cap-add NET_ADMIN --cap-add NET_RAW vxcontrol/kali-linux bash'
For macOS users, add these aliases to your shell profile (.zshrc, .bash_profile):
bash# Network scanning alias nmap='docker run --rm --net=host vxcontrol/kali-linux nmap' alias masscan='docker run --rm --net=host vxcontrol/kali-linux masscan' alias naabu='docker run --rm --net=host vxcontrol/kali-linux naabu' # Web application testing alias nuclei='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux nuclei' alias sqlmap='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux sqlmap' alias gobuster='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux gobuster' alias ffuf='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux ffuf' alias nikto='docker run --rm --net=host -v $(pwd):/work -w /work vxcontrol/kali-linux nikto' # Reconnaissance alias subfinder='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux subfinder' alias httpx='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux httpx' alias amass='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux amass' alias katana='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux katana' # Windows/AD testing alias crackmapexec='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux crackmapexec' alias evil-winrm='docker run --rm -it -v $(pwd):/work -w /work vxcontrol/kali-linux evil-winrm' alias impacket-secretsdump='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux impacket-secretsdump' # Password cracking alias hashcat='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux hashcat' alias john='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux john' alias hydra='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux hydra' # Metasploit alias msfconsole='docker run --rm -it --net=host -v ~/.msf4:/root/.msf4 -v $(pwd):/work -w /work vxcontrol/kali-linux msfconsole' alias msfvenom='docker run --rm -v $(pwd):/work -w /work vxcontrol/kali-linux msfvenom' # Interactive shell alias kali-shell='docker run --rm -it -v $(pwd):/work -w /work vxcontrol/kali-linux bash'
Note for macOS users: Raw network capabilities (--cap-add NET_ADMIN --cap-add NET_RAW) are not available in Docker Desktop for Mac, so they are omitted from network scanning tools. For advanced network testing, *** using a Linux VM or remote testing environment.
Perfect for autonomous AI-driven penetration testing:
bash# Spawn container for AI agent automation docker run --rm -d --name pentesting-session \ --cap-add NET_ADMIN --cap-add NET_RAW \ -v /tmp/results:/results \ vxcontrol/kali-linux tail -f /dev/null # AI agents can execute commands docker exec pentesting-session nmap -sn 192.168.1.0/24 docker exec pentesting-session nuclei -u https://example.com -o /results/vulns.json
Designed for seamless integration with PentAGI - an autonomous AI agents system for penetration testing.
⚠️ Important: These images contain penetration testing tools intended for authorized security testing only.
See Disclaimer section for complete legal and ethical usage guidelines.
Container Configuration: The Docker configuration files and build scripts in this project are licensed under the MIT License.
Included Software: This Docker image contains software packages from the official Kali Linux repository and third-party tools, each governed by their respective licenses. Users are responsible for ensuring compliance with the individual licenses of all included software for their specific use cases.
Base Image: Built upon the official https://hub.docker.com/r/kalilinux/kali-rolling image, subject to its licensing terms and conditions.
Ethical Use Only: This image is provided exclusively for ethical hacking, authorized penetration testing, and security research in full compliance with the Kali Linux EULA and the licenses of all included software.
No Warranty: The authors and contributors provide this image "as is" without warranty of any kind and disclaim all liability for any damages arising from the use of this image or any software contained within it.
User Responsibility: Users are solely responsible for ensuring their use complies with all applicable laws, regulations, and the terms of service of target systems. Only use on systems you own or have explicit written authorization to test.
您可以使用以下命令拉取该镜像。请将 <标签> 替换为具体的标签版本。如需查看所有可用标签版本,请访问 标签列表页面。

探索更多轩辕镜像的使用方法,找到最适合您系统的配置方式
通过 Docker 登录认证访问私有仓库
无需登录使用专属域名
Kubernetes 集群配置 Containerd
K3s 轻量级 Kubernetes 镜像加速
VS Code Dev Containers 配置
Podman 容器引擎配置
HPC 科学计算容器配置
ghcr、Quay、nvcr 等镜像仓库
Harbor Proxy Repository 对接专属域名
Portainer Registries 加速拉取
Nexus3 Docker Proxy 内网缓存
需要其他帮助?请查看我们的 常见问题Docker 镜像访问常见问题解答 或 提交工单
docker search 限制
站内搜不到镜像
离线 save/load
插件要用 plugin install
WSL 拉取慢
安全与 digest
新手拉取配置
镜像合规机制
manifest unknown
no matching manifest(架构)
invalid tar header(解压)
TLS 证书失败
DNS 超时
域名连通性排查
410 Gone 排查
402 与流量用尽
401 认证失败
429 限流
D-Bus 凭证提示
413 与超大单层
来自真实用户的反馈,见证轩辕镜像的优质服务