Explore siusiu: A Docker‑Powered Penetration Testing Toolbox
siusiu is a Docker‑based penetration testing toolbox that bundles dozens of security utilities as Docker images, offering an easy‑to‑use console, multiple installation methods, and a rich command set for both interactive and scripted security assessments.
Project Overview
siusiu is a Docker‑based penetration testing toolbox designed for portable, out‑of‑the‑box use, allowing users to download and run security tools on demand.
Features
The toolbox provides a shell console where users can view the list of third‑party security tools, download them as needed, run them, and view documentation and usage examples via the demos command. It also supports a non‑interactive mode for programmatic invocation, e.g., siusiu exec help.
Installation
Download the binary (Docker version) and give it executable permission, or install from source:
git clone --depth 1 https://github.com/ShangRui-hash/siusiu.git
cd siusiu
go build -o siusiuOr install directly with Go:
go get github.com/ShangRui-hash/siusiu@latest
go install github.com/ShangRui-hash/siusiu@latestUsage
siusiu:/> help
Commands:
403bypasser 403 bypass tool
amass Information gathering tool
arjun Parameter discovery tool
cewl Crawl website keywords to generate dictionaries
clear clear the screen
cloudfail Find real IP behind Cloudflare
crawlergo Headless Chrome crawler for URL collection
cve-2018-15473-exp SSH username enumeration exploit
davtest WebDAV exploitation tool
dirsearch Directory brute‑force tool
ds_store_exp .DS_Store file leakage script
exit exit the program
fetcher Create dictionary from specified directory
ffuf Fuzzing tool
firefox-decrypt Firefox password extraction tool
gau Passive URL collection (Open Threat, Wayback, Common Crawl)
githack:bugscanteam Git leak tool (downloads .git folder)
githack:lijiejie Git leak tool (downloads current version only)
gobuster Directory scanner (fallback for dirsearch)
gopherus SSRF gopher payload generator
help display help
http3-client HTTP/3 client
hydra Password brute‑force tool
input-scanner Extract URLs from JS files
jsfinder Extract URLs and subdomains from JS source
ksubdomain Subdomain brute‑force tool
linkfinder Discover endpoints and parameters in JavaScript files
nmap Host discovery, port scanning, service detection
pacu AWS exploitation framework
paramspider Parameter mining tool
payloads-all-the-things Comprehensive payload collection
php_mt_seed PHP pseudo‑random number seed cracker
pocsuite3 POC testing framework
rip-hg.pl .hg file leakage script
rip-svn.pl .svn file leakage script
searchsploit Exploit/Poc search tool
smbmap SMB service exploitation tool
smtp-user-enum SMTP user enumeration tool
sqlmap SQL injection tool
sqlmapapi sqlmap API server
steghide Steganography tool
stegseek Steganography password cracker
subfinder Subdomain discovery tool
svn-exp SVN file leakage script
tool-helper Retrieve tool help documents
waybackurls Retrieve historical URLs for a domain
wfuzz Web application fuzzing tool
whatweb Web fingerprinting tool
wpscan WordPress vulnerability scanner
xray Vulnerability scanner
xray-listen xray listening toolAutomatic Dependency Handling
If pocsuite3 is not installed, siusiu will automatically download and run it.
Download
Source code and releases are available at https://github.com/ShangRui-hash/siusiu .
Signed-in readers can open the original source through BestHub's protected redirect.
This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactand we will review it promptly.
MaGe Linux Operations
Founded in 2009, MaGe Education is a top Chinese high‑end IT training brand. Its graduates earn 12K+ RMB salaries, and the school has trained tens of thousands of students. It offers high‑pay courses in Linux cloud operations, Python full‑stack, automation, data analysis, AI, and Go high‑concurrency architecture. Thanks to quality courses and a solid reputation, it has talent partnerships with numerous internet firms.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.
