set new container registry, point installer to branch

This commit is contained in:
t3chn0m4g3
2020-09-04 13:29:14 +00:00
parent 2e5639a50b
commit 1ee9c29805
16 changed files with 157 additions and 157 deletions

View File

@ -37,7 +37,7 @@ services:
- adbhoney_local
ports:
- "5555:5555"
image: "dtagdevsec/adbhoney:2006"
image: "ghcr.io/telekom-security/adbhoney:2006"
read_only: true
volumes:
- /data/adbhoney/log:/opt/adbhoney/log
@ -53,7 +53,7 @@ services:
ports:
- "5000:5000/udp"
- "8443:8443"
image: "dtagdevsec/ciscoasa:2006"
image: "ghcr.io/telekom-security/ciscoasa:2006"
read_only: true
volumes:
- /data/ciscoasa/log:/var/log/ciscoasa
@ -66,7 +66,7 @@ services:
- citrixhoneypot_local
ports:
- "443:443"
image: "dtagdevsec/citrixhoneypot:2006"
image: "ghcr.io/telekom-security/citrixhoneypot:2006"
read_only: true
volumes:
- /data/citrixhoneypot/logs:/opt/citrixhoneypot/logs
@ -88,7 +88,7 @@ services:
ports:
- "161:161"
- "2404:2404"
image: "dtagdevsec/conpot:2006"
image: "ghcr.io/telekom-security/conpot:2006"
read_only: true
volumes:
- /data/conpot/log:/var/log/conpot
@ -109,7 +109,7 @@ services:
- conpot_local_guardian_ast
ports:
- "10001:10001"
image: "dtagdevsec/conpot:2006"
image: "ghcr.io/telekom-security/conpot:2006"
read_only: true
volumes:
- /data/conpot/log:/var/log/conpot
@ -130,7 +130,7 @@ services:
- conpot_local_ipmi
ports:
- "623:623"
image: "dtagdevsec/conpot:2006"
image: "ghcr.io/telekom-security/conpot:2006"
read_only: true
volumes:
- /data/conpot/log:/var/log/conpot
@ -152,7 +152,7 @@ services:
ports:
- "1025:1025"
- "50100:50100"
image: "dtagdevsec/conpot:2006"
image: "ghcr.io/telekom-security/conpot:2006"
read_only: true
volumes:
- /data/conpot/log:/var/log/conpot
@ -169,7 +169,7 @@ services:
ports:
- "22:22"
- "23:23"
image: "dtagdevsec/cowrie:2006"
image: "ghcr.io/telekom-security/cowrie:2006"
read_only: true
volumes:
- /data/cowrie/downloads:/home/cowrie/cowrie/dl
@ -188,7 +188,7 @@ services:
- dicompot_local
ports:
- "11112:11112"
image: "dtagdevsec/dicompot:2006"
image: "ghcr.io/telekom-security/dicompot:2006"
read_only: true
volumes:
- /data/dicompot/log:/var/log/dicompot
@ -219,7 +219,7 @@ services:
- "5060:5060/udp"
- "5061:5061"
- "27017:27017"
image: "dtagdevsec/dionaea:2006"
image: "ghcr.io/telekom-security/dionaea:2006"
read_only: true
volumes:
- /data/dionaea/roots/ftp:/opt/dionaea/var/dionaea/roots/ftp
@ -239,7 +239,7 @@ services:
- elasticpot_local
ports:
- "9200:9200"
image: "dtagdevsec/elasticpot:2006"
image: "ghcr.io/telekom-security/elasticpot:2006"
read_only: true
volumes:
- /data/elasticpot/log:/opt/elasticpot/log
@ -268,7 +268,7 @@ services:
- "1080:1080"
- "5432:5432"
- "5900:5900"
image: "dtagdevsec/heralding:2006"
image: "ghcr.io/telekom-security/heralding:2006"
read_only: true
volumes:
- /data/heralding/log:/var/log/heralding
@ -281,7 +281,7 @@ services:
- honeysap_local
ports:
- "3299:3299"
image: "dtagdevsec/honeysap:2006"
image: "ghcr.io/telekom-security/honeysap:2006"
volumes:
- /data/honeysap/log:/opt/honeysap/log
@ -294,7 +294,7 @@ services:
network_mode: "host"
cap_add:
- NET_ADMIN
image: "dtagdevsec/honeytrap:2006"
image: "ghcr.io/telekom-security/honeytrap:2006"
read_only: true
volumes:
- /data/honeytrap/attacks:/opt/honeytrap/var/attacks
@ -315,7 +315,7 @@ services:
- mailoney_local
ports:
- "25:25"
image: "dtagdevsec/mailoney:2006"
image: "ghcr.io/telekom-security/mailoney:2006"
read_only: true
volumes:
- /data/mailoney/log:/opt/mailoney/logs
@ -328,7 +328,7 @@ services:
- medpot_local
ports:
- "2575:2575"
image: "dtagdevsec/medpot:2006"
image: "ghcr.io/telekom-security/medpot:2006"
read_only: true
volumes:
- /data/medpot/log/:/var/log/medpot
@ -349,7 +349,7 @@ services:
- rdpy_local
ports:
- "3389:3389"
image: "dtagdevsec/rdpy:2006"
image: "ghcr.io/telekom-security/rdpy:2006"
read_only: true
volumes:
- /data/rdpy/log:/var/log/rdpy
@ -362,7 +362,7 @@ services:
tty: true
networks:
- tanner_local
image: "dtagdevsec/redis:2006"
image: "ghcr.io/telekom-security/redis:2006"
read_only: true
## PHP Sandbox service
@ -372,7 +372,7 @@ services:
tty: true
networks:
- tanner_local
image: "dtagdevsec/phpox:2006"
image: "ghcr.io/telekom-security/phpox:2006"
read_only: true
## Tanner API Service
@ -384,7 +384,7 @@ services:
tty: true
networks:
- tanner_local
image: "dtagdevsec/tanner:2006"
image: "ghcr.io/telekom-security/tanner:2006"
read_only: true
volumes:
- /data/tanner/log:/var/log/tanner
@ -401,7 +401,7 @@ services:
# tty: true
# networks:
# - tanner_local
# image: "dtagdevsec/tanner:2006"
# image: "ghcr.io/telekom-security/tanner:2006"
# command: tannerweb
# read_only: true
# volumes:
@ -418,7 +418,7 @@ services:
tty: true
networks:
- tanner_local
image: "dtagdevsec/tanner:2006"
image: "ghcr.io/telekom-security/tanner:2006"
command: tanner
read_only: true
volumes:
@ -438,7 +438,7 @@ services:
- tanner_local
ports:
- "80:80"
image: "dtagdevsec/snare:2006"
image: "ghcr.io/telekom-security/snare:2006"
depends_on:
- tanner
@ -456,7 +456,7 @@ services:
- NET_ADMIN
- SYS_NICE
- NET_RAW
image: "dtagdevsec/fatt:2006"
image: "ghcr.io/telekom-security/fatt:2006"
volumes:
- /data/fatt/log:/opt/fatt/log
@ -465,7 +465,7 @@ services:
container_name: p0f
restart: always
network_mode: "host"
image: "dtagdevsec/p0f:2006"
image: "ghcr.io/telekom-security/p0f:2006"
read_only: true
volumes:
- /data/p0f/log:/var/log/p0f
@ -482,7 +482,7 @@ services:
- NET_ADMIN
- SYS_NICE
- NET_RAW
image: "dtagdevsec/suricata:2006"
image: "ghcr.io/telekom-security/suricata:2006"
volumes:
- /data/suricata/log:/var/log/suricata
@ -499,7 +499,7 @@ services:
- cyberchef_local
ports:
- "127.0.0.1:64299:8000"
image: "dtagdevsec/cyberchef:2006"
image: "ghcr.io/telekom-security/cyberchef:2006"
read_only: true
#### ELK
@ -523,7 +523,7 @@ services:
mem_limit: 4g
ports:
- "127.0.0.1:64298:9200"
image: "dtagdevsec/elasticsearch:2006"
image: "ghcr.io/telekom-security/elasticsearch:2006"
volumes:
- /data:/data
@ -536,7 +536,7 @@ services:
condition: service_healthy
ports:
- "127.0.0.1:64296:5601"
image: "dtagdevsec/kibana:2006"
image: "ghcr.io/telekom-security/kibana:2006"
## Logstash service
logstash:
@ -549,7 +549,7 @@ services:
condition: service_healthy
env_file:
- /opt/tpot/etc/compose/elk_environment
image: "dtagdevsec/logstash:2006"
image: "ghcr.io/telekom-security/logstash:2006"
volumes:
- /data:/data
@ -562,7 +562,7 @@ services:
condition: service_healthy
ports:
- "127.0.0.1:64302:9100"
image: "dtagdevsec/head:2006"
image: "ghcr.io/telekom-security/head:2006"
read_only: true
# Ewsposter service
@ -582,7 +582,7 @@ services:
- EWS_HPFEEDS_FORMAT=json
env_file:
- /opt/tpot/etc/compose/elk_environment
image: "dtagdevsec/ewsposter:2006"
image: "ghcr.io/telekom-security/ewsposter:2006"
volumes:
- /data:/data
- /data/ews/conf/ews.ip:/opt/ewsposter/ews.ip
@ -610,7 +610,7 @@ services:
ports:
- "64297:64297"
- "127.0.0.1:64304:64304"
image: "dtagdevsec/nginx:2006"
image: "ghcr.io/telekom-security/nginx:2006"
read_only: true
volumes:
- /data/nginx/cert/:/etc/nginx/cert/:ro
@ -628,6 +628,6 @@ services:
- spiderfoot_local
ports:
- "127.0.0.1:64303:8080"
image: "dtagdevsec/spiderfoot:2006"
image: "ghcr.io/telekom-security/spiderfoot:2006"
volumes:
- /data/spiderfoot/spiderfoot.db:/home/spiderfoot/spiderfoot.db