An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit !
GNU General Public License v3.0
11.47k
stars
3.85k
forks
source link
Implement advanced security measures and optimize Dockerfile #925
This commit enhances the security and efficiency of the Dockerfile used for deploying the Zphisher application. The following improvements were made:
Switched to Alpine Linux 3.14 with security-hardened settings to reduce the attack surface and ensure the base image is up-to-date with security patches.
Implemented a multi-stage build approach to minimize the final image size and reduce the number of layers, improving build efficiency and security.
Utilized environment variables for defining application version (ZPHISHER_VERSION) and other configurable parameters, enhancing flexibility and maintainability.
Enhanced permissions and ownership management for application files (zphisher.sh and related scripts) to enforce least privilege access, improving container security.
Added a non-root user (zphisher_user) and group (zphisher_group) to run the application inside the container, further reducing potential vulnerabilities.
Integrated a healthcheck mechanism to monitor the container's health status, ensuring the application inside is responsive and functioning as expected.
Implemented robust error handling during container startup, checking for the existence of critical files (zphisher.sh) and exiting gracefully with appropriate error messages if not found.
These changes aim to provide a more secure, efficient, and reliable Dockerfile setup for deploying Zphisher across different operating systems while adhering to best practices in containerization and security.
This commit enhances the security and efficiency of the Dockerfile used for deploying the Zphisher application. The following improvements were made:
Switched to Alpine Linux 3.14 with security-hardened settings to reduce the attack surface and ensure the base image is up-to-date with security patches.
Implemented a multi-stage build approach to minimize the final image size and reduce the number of layers, improving build efficiency and security.
Utilized environment variables for defining application version (
ZPHISHER_VERSION
) and other configurable parameters, enhancing flexibility and maintainability.Enhanced permissions and ownership management for application files (
zphisher.sh
and related scripts) to enforce least privilege access, improving container security.Added a non-root user (
zphisher_user
) and group (zphisher_group
) to run the application inside the container, further reducing potential vulnerabilities.Integrated a healthcheck mechanism to monitor the container's health status, ensuring the application inside is responsive and functioning as expected.
Implemented robust error handling during container startup, checking for the existence of critical files (
zphisher.sh
) and exiting gracefully with appropriate error messages if not found.These changes aim to provide a more secure, efficient, and reliable Dockerfile setup for deploying Zphisher across different operating systems while adhering to best practices in containerization and security.