set new container registry, point installer to branch

This commit is contained in:
t3chn0m4g3
2020-09-04 13:29:14 +00:00
parent 2e5639a50b
commit 1ee9c29805
16 changed files with 157 additions and 157 deletions

View File

@ -37,7 +37,7 @@ services:
- adbhoney_local
ports:
- "5555:5555"
image: "dtagdevsec/adbhoney:2006"
image: "ghcr.io/telekom-security/adbhoney:2006"
read_only: true
volumes:
- /data/adbhoney/log:/opt/adbhoney/log
@ -54,7 +54,7 @@ services:
ports:
- "5000:5000/udp"
- "8443:8443"
image: "dtagdevsec/ciscoasa:2006"
image: "ghcr.io/telekom-security/ciscoasa:2006"
read_only: true
volumes:
- /data/ciscoasa/log:/var/log/ciscoasa
@ -67,7 +67,7 @@ services:
- citrixhoneypot_local
ports:
- "443:443"
image: "dtagdevsec/citrixhoneypot:2006"
image: "ghcr.io/telekom-security/citrixhoneypot:2006"
read_only: true
volumes:
- /data/citrixhoneypot/logs:/opt/citrixhoneypot/logs
@ -89,7 +89,7 @@ services:
ports:
- "161:161"
- "2404:2404"
image: "dtagdevsec/conpot:2006"
image: "ghcr.io/telekom-security/conpot:2006"
read_only: true
volumes:
- /data/conpot/log:/var/log/conpot
@ -110,7 +110,7 @@ services:
- conpot_local_guardian_ast
ports:
- "10001:10001"
image: "dtagdevsec/conpot:2006"
image: "ghcr.io/telekom-security/conpot:2006"
read_only: true
volumes:
- /data/conpot/log:/var/log/conpot
@ -131,7 +131,7 @@ services:
- conpot_local_ipmi
ports:
- "623:623"
image: "dtagdevsec/conpot:2006"
image: "ghcr.io/telekom-security/conpot:2006"
read_only: true
volumes:
- /data/conpot/log:/var/log/conpot
@ -153,7 +153,7 @@ services:
ports:
- "1025:1025"
- "50100:50100"
image: "dtagdevsec/conpot:2006"
image: "ghcr.io/telekom-security/conpot:2006"
read_only: true
volumes:
- /data/conpot/log:/var/log/conpot
@ -170,7 +170,7 @@ services:
ports:
- "22:22"
- "23:23"
image: "dtagdevsec/cowrie:2006"
image: "ghcr.io/telekom-security/cowrie:2006"
read_only: true
volumes:
- /data/cowrie/downloads:/home/cowrie/cowrie/dl
@ -189,7 +189,7 @@ services:
- dicompot_local
ports:
- "11112:11112"
image: "dtagdevsec/dicompot:2006"
image: "ghcr.io/telekom-security/dicompot:2006"
read_only: true
volumes:
- /data/dicompot/log:/var/log/dicompot
@ -220,7 +220,7 @@ services:
- "5060:5060/udp"
- "5061:5061"
- "27017:27017"
image: "dtagdevsec/dionaea:2006"
image: "ghcr.io/telekom-security/dionaea:2006"
read_only: true
volumes:
- /data/dionaea/roots/ftp:/opt/dionaea/var/dionaea/roots/ftp
@ -240,7 +240,7 @@ services:
- elasticpot_local
ports:
- "9200:9200"
image: "dtagdevsec/elasticpot:2006"
image: "ghcr.io/telekom-security/elasticpot:2006"
read_only: true
volumes:
- /data/elasticpot/log:/opt/elasticpot/log
@ -269,7 +269,7 @@ services:
- "1080:1080"
- "5432:5432"
- "5900:5900"
image: "dtagdevsec/heralding:2006"
image: "ghcr.io/telekom-security/heralding:2006"
read_only: true
volumes:
- /data/heralding/log:/var/log/heralding
@ -288,7 +288,7 @@ services:
- "2324:2324"
- "4096:4096"
# - "9200:9200"
image: "dtagdevsec/honeypy:2006"
image: "ghcr.io/telekom-security/honeypy:2006"
read_only: true
volumes:
- /data/honeypy/log:/opt/honeypy/log
@ -301,7 +301,7 @@ services:
- honeysap_local
ports:
- "3299:3299"
image: "dtagdevsec/honeysap:2006"
image: "ghcr.io/telekom-security/honeysap:2006"
volumes:
- /data/honeysap/log:/opt/honeysap/log
@ -314,7 +314,7 @@ services:
network_mode: "host"
cap_add:
- NET_ADMIN
image: "dtagdevsec/honeytrap:2006"
image: "ghcr.io/telekom-security/honeytrap:2006"
read_only: true
volumes:
- /data/honeytrap/attacks:/opt/honeytrap/var/attacks
@ -335,7 +335,7 @@ services:
- mailoney_local
ports:
- "25:25"
image: "dtagdevsec/mailoney:2006"
image: "ghcr.io/telekom-security/mailoney:2006"
read_only: true
volumes:
- /data/mailoney/log:/opt/mailoney/logs
@ -348,7 +348,7 @@ services:
- medpot_local
ports:
- "2575:2575"
image: "dtagdevsec/medpot:2006"
image: "ghcr.io/telekom-security/medpot:2006"
read_only: true
volumes:
- /data/medpot/log/:/var/log/medpot
@ -369,7 +369,7 @@ services:
- rdpy_local
ports:
- "3389:3389"
image: "dtagdevsec/rdpy:2006"
image: "ghcr.io/telekom-security/rdpy:2006"
read_only: true
volumes:
- /data/rdpy/log:/var/log/rdpy
@ -382,7 +382,7 @@ services:
tty: true
networks:
- tanner_local
image: "dtagdevsec/redis:2006"
image: "ghcr.io/telekom-security/redis:2006"
read_only: true
## PHP Sandbox service
@ -392,7 +392,7 @@ services:
tty: true
networks:
- tanner_local
image: "dtagdevsec/phpox:2006"
image: "ghcr.io/telekom-security/phpox:2006"
read_only: true
## Tanner API Service
@ -404,7 +404,7 @@ services:
tty: true
networks:
- tanner_local
image: "dtagdevsec/tanner:2006"
image: "ghcr.io/telekom-security/tanner:2006"
read_only: true
volumes:
- /data/tanner/log:/var/log/tanner
@ -421,7 +421,7 @@ services:
# tty: true
# networks:
# - tanner_local
# image: "dtagdevsec/tanner:2006"
# image: "ghcr.io/telekom-security/tanner:2006"
# command: tannerweb
# read_only: true
# volumes:
@ -438,7 +438,7 @@ services:
tty: true
networks:
- tanner_local
image: "dtagdevsec/tanner:2006"
image: "ghcr.io/telekom-security/tanner:2006"
command: tanner
read_only: true
volumes:
@ -458,7 +458,7 @@ services:
- tanner_local
ports:
- "80:80"
image: "dtagdevsec/snare:2006"
image: "ghcr.io/telekom-security/snare:2006"
depends_on:
- tanner
@ -476,7 +476,7 @@ services:
- NET_ADMIN
- SYS_NICE
- NET_RAW
image: "dtagdevsec/fatt:2006"
image: "ghcr.io/telekom-security/fatt:2006"
volumes:
- /data/fatt/log:/opt/fatt/log
@ -485,7 +485,7 @@ services:
container_name: p0f
restart: always
network_mode: "host"
image: "dtagdevsec/p0f:2006"
image: "ghcr.io/telekom-security/p0f:2006"
read_only: true
volumes:
- /data/p0f/log:/var/log/p0f
@ -502,7 +502,7 @@ services:
- NET_ADMIN
- SYS_NICE
- NET_RAW
image: "dtagdevsec/suricata:2006"
image: "ghcr.io/telekom-security/suricata:2006"
volumes:
- /data/suricata/log:/var/log/suricata
@ -528,7 +528,7 @@ services:
- EWS_HPFEEDS_FORMAT=json
env_file:
- /opt/tpot/etc/compose/elk_environment
image: "dtagdevsec/ewsposter:2006"
image: "ghcr.io/telekom-security/ewsposter:2006"
volumes:
- /data:/data
- /data/ews/conf/ews.ip:/opt/ewsposter/ews.ip