function dockershell() { docker run --rm -i -t --entrypoint=/bin/bash "$@" } function dockershellsh() { docker run --rm -i -t --entrypoint=/bin/sh "$@" } function dockershellhere() { dirname=${PWD##*/} docker run --rm -it --entrypoint=/bin/bash -v `pwd`:/${dirname} -w /${dirname} "$@" } function dockershellshhere() { docker run --rm -it --entrypoint=/bin/sh -v `pwd`:/${dirname} -w /${dirname} "$@" } function dockerwindowshellhere() { dirname=${PWD##*/} docker -c 2019-box run --rm -it -v "C:${PWD}:C:/source" -w "C:/source" "$@" } impacket() { docker run --rm -it rflathers/impacket "$@" } smbservehere() { local sharename [[ -z $1 ]] && sharename="SHARE" || sharename=$1 docker run --rm -it -p 445:445 -v "${PWD}:/tmp/serve" rflathers/impacket smbserver.py -smb2support $sharename /tmp/serve } nginxhere() { docker run --rm -it -p 80:80 -p 443:443 -v "${PWD}:/srv/data" rflathers/nginxserve } webdavhere() { docker run --rm -it -p 80:80 -v "${PWD}:/srv/data/share" rflathers/webdav } metasploit() { docker run --rm -it -v "${HOME}/.msf4:/home/msf/.msf4" metasploitframework/metasploit-framework ./msfconsole "$@" } metasploitports() { docker run --rm -it -v "${HOME}/.msf4:/home/msf/.msf4" -p 8443-8500:8443-8500 metasploitframework/metasploit-framework ./msfconsole "$@" } msfvenomhere() { docker run --rm -it -v "${HOME}/.msf4:/home/msf/.msf4" -v "${PWD}:/data" metasploitframework/metasploit-framework ./msfvenom "$@" } reqdump() { docker run --rm -it -p 80:3000 rflathers/reqdump } postfiledumphere() { docker run --rm -it -p80:3000 -v "${PWD}:/data" rflathers/postfiledump }