set new container registry, point installer to branch

This commit is contained in:
t3chn0m4g3
2020-09-04 13:29:14 +00:00
parent 2e5639a50b
commit 1ee9c29805
16 changed files with 157 additions and 157 deletions

View File

@ -48,7 +48,7 @@ services:
- "21:21"
- "44818:44818"
- "47808:47808"
image: "dtagdevsec/conpot:2006"
image: "ghcr.io/telekom-security/conpot:2006"
read_only: true
volumes:
- /data/conpot/log:/var/log/conpot
@ -70,7 +70,7 @@ services:
ports:
# - "161:161"
- "2404:2404"
image: "dtagdevsec/conpot:2006"
image: "ghcr.io/telekom-security/conpot:2006"
read_only: true
volumes:
- /data/conpot/log:/var/log/conpot
@ -91,7 +91,7 @@ services:
- conpot_local_guardian_ast
ports:
- "10001:10001"
image: "dtagdevsec/conpot:2006"
image: "ghcr.io/telekom-security/conpot:2006"
read_only: true
volumes:
- /data/conpot/log:/var/log/conpot
@ -112,7 +112,7 @@ services:
- conpot_local_ipmi
ports:
- "623:623"
image: "dtagdevsec/conpot:2006"
image: "ghcr.io/telekom-security/conpot:2006"
read_only: true
volumes:
- /data/conpot/log:/var/log/conpot
@ -134,7 +134,7 @@ services:
ports:
- "1025:1025"
- "50100:50100"
image: "dtagdevsec/conpot:2006"
image: "ghcr.io/telekom-security/conpot:2006"
read_only: true
volumes:
- /data/conpot/log:/var/log/conpot
@ -151,7 +151,7 @@ services:
ports:
- "22:22"
- "23:23"
image: "dtagdevsec/cowrie:2006"
image: "ghcr.io/telekom-security/cowrie:2006"
read_only: true
volumes:
- /data/cowrie/downloads:/home/cowrie/cowrie/dl
@ -170,7 +170,7 @@ services:
- dicompot_local
ports:
- "11112:11112"
image: "dtagdevsec/dicompot:2006"
image: "ghcr.io/telekom-security/dicompot:2006"
read_only: true
volumes:
- /data/dicompot/log:/var/log/dicompot
@ -199,7 +199,7 @@ services:
# - "3389:3389"
# - "5432:5432"
- "5900:5900"
image: "dtagdevsec/heralding:2006"
image: "ghcr.io/telekom-security/heralding:2006"
read_only: true
volumes:
- /data/heralding/log:/var/log/heralding
@ -212,7 +212,7 @@ services:
- honeysap_local
ports:
- "3299:3299"
image: "dtagdevsec/honeysap:2006"
image: "ghcr.io/telekom-security/honeysap:2006"
volumes:
- /data/honeysap/log:/opt/honeysap/log
@ -225,7 +225,7 @@ services:
network_mode: "host"
cap_add:
- NET_ADMIN
image: "dtagdevsec/honeytrap:2006"
image: "ghcr.io/telekom-security/honeytrap:2006"
read_only: true
volumes:
- /data/honeytrap/attacks:/opt/honeytrap/var/attacks
@ -240,7 +240,7 @@ services:
- medpot_local
ports:
- "2575:2575"
image: "dtagdevsec/medpot:2006"
image: "ghcr.io/telekom-security/medpot:2006"
read_only: true
volumes:
- /data/medpot/log/:/var/log/medpot
@ -261,7 +261,7 @@ services:
- rdpy_local
ports:
- "3389:3389"
image: "dtagdevsec/rdpy:2006"
image: "ghcr.io/telekom-security/rdpy:2006"
read_only: true
volumes:
- /data/rdpy/log:/var/log/rdpy
@ -280,7 +280,7 @@ services:
- NET_ADMIN
- SYS_NICE
- NET_RAW
image: "dtagdevsec/fatt:2006"
image: "ghcr.io/telekom-security/fatt:2006"
volumes:
- /data/fatt/log:/opt/fatt/log
@ -289,7 +289,7 @@ services:
container_name: p0f
restart: always
network_mode: "host"
image: "dtagdevsec/p0f:2006"
image: "ghcr.io/telekom-security/p0f:2006"
read_only: true
volumes:
- /data/p0f/log:/var/log/p0f
@ -306,7 +306,7 @@ services:
- NET_ADMIN
- SYS_NICE
- NET_RAW
image: "dtagdevsec/suricata:2006"
image: "ghcr.io/telekom-security/suricata:2006"
volumes:
- /data/suricata/log:/var/log/suricata
@ -323,7 +323,7 @@ services:
- cyberchef_local
ports:
- "127.0.0.1:64299:8000"
image: "dtagdevsec/cyberchef:2006"
image: "ghcr.io/telekom-security/cyberchef:2006"
read_only: true
#### ELK
@ -347,7 +347,7 @@ services:
mem_limit: 4g
ports:
- "127.0.0.1:64298:9200"
image: "dtagdevsec/elasticsearch:2006"
image: "ghcr.io/telekom-security/elasticsearch:2006"
volumes:
- /data:/data
@ -360,7 +360,7 @@ services:
condition: service_healthy
ports:
- "127.0.0.1:64296:5601"
image: "dtagdevsec/kibana:2006"
image: "ghcr.io/telekom-security/kibana:2006"
## Logstash service
logstash:
@ -373,7 +373,7 @@ services:
condition: service_healthy
env_file:
- /opt/tpot/etc/compose/elk_environment
image: "dtagdevsec/logstash:2006"
image: "ghcr.io/telekom-security/logstash:2006"
volumes:
- /data:/data
@ -386,7 +386,7 @@ services:
condition: service_healthy
ports:
- "127.0.0.1:64302:9100"
image: "dtagdevsec/head:2006"
image: "ghcr.io/telekom-security/head:2006"
read_only: true
# Ewsposter service
@ -406,7 +406,7 @@ services:
- EWS_HPFEEDS_FORMAT=json
env_file:
- /opt/tpot/etc/compose/elk_environment
image: "dtagdevsec/ewsposter:2006"
image: "ghcr.io/telekom-security/ewsposter:2006"
volumes:
- /data:/data
- /data/ews/conf/ews.ip:/opt/ewsposter/ews.ip
@ -434,7 +434,7 @@ services:
ports:
- "64297:64297"
- "127.0.0.1:64304:64304"
image: "dtagdevsec/nginx:2006"
image: "ghcr.io/telekom-security/nginx:2006"
read_only: true
volumes:
- /data/nginx/cert/:/etc/nginx/cert/:ro
@ -452,6 +452,6 @@ services:
- spiderfoot_local
ports:
- "127.0.0.1:64303:8080"
image: "dtagdevsec/spiderfoot:2006"
image: "ghcr.io/telekom-security/spiderfoot:2006"
volumes:
- /data/spiderfoot/spiderfoot.db:/home/spiderfoot/spiderfoot.db