Docker lets you spin up vulnerable applications in seconds. No more downloading ISOs and configuring VMs — just one command.
sudo apt install docker.io docker-compose -y
sudo systemctl enable docker --now
sudo usermod -aG docker $USERdocker run -d -p 80:80 vulnerables/web-dvwadocker run -d -p 3000:3000 bkimminich/juice-shopdocker run -d -p 8080:8080 webgoat/webgoatdocker run -d -p 8585:8585 vulhub/metasploitable3# VulnHub machines as Docker containers
docker run -d --name vuln-machine vulnerability-image# docker-compose.yml
version: '3'
services:
webapp:
image: vulnerables/web-dvwa
ports: ["80:80"]
database:
image: mysql:5.7
environment:
MYSQL_ROOT_PASSWORD: toordocker-compose up -d # Start entire lab
docker-compose down # Destroy everythingSubscribe to ONLY4YOU and get hands-on access to 40+ premium courses — Ethical Hacking, Kali Linux, Metasploit, Network Hacking, Bug Bounty & more!