Spry LogoOpsfolio
Fleetfolio Pentest

Quick Start

Installation guide for Fleetfolio Pentest Module.

Quick Start Guide

This guide explains how to set up and run Fleetfolio Pentest Module via Docker.

Install Docker

Ensure Docker is installed and running on your system.

sudo apt update && sudo apt install docker.io -y && sudo systemctl enable docker --now

Error Fix

If the update fails, run:

sudo sed -i 's|http://http.kali.org|https://http.kali.org|' /etc/apt/sources.list && sudo apt-get clean && sudo apt-get update --fix-missing

Docker Pull

Pull the docker image

sudo docker pull fleetfolio/fleetfolio

Configure Environment

Create your .env configuration using the following block:

sudo tee -a .env > /dev/null << 'EOF'
# Scope configuration
OPSFOLIO_EAA_HOME=/opt/eaa/sessions
OPSFOLIO_EAA_TENANT_ID=NET1234
OPSFOLIO_EAA_TENANT_NAME=Netspective
OPSFOLIO_EAA_PURPOSE=Threat
OPSFOLIO_EAA_DESCRIPTION=Demo_Threat
OPSFOLIO_EAA_CONTEXT_JSON='{ \"Sample\": \"Value\" }'
OPSFOLIO_EAA_EXIT_EMAIL_ADDRESSES=example@nespective.com,example2@nespective.com,example3@gmal.com
OPSFOLIO_EAA_DOMAINS=netspective.com
OPSFOLIO_EAA_KEY_URLS=https://netspective.com
OPSFOLIO_EAA_SUBDOMAINS=
OPSFOLIO_EAA_IP_RANGES=
OPSFOLIO_EAA_EXCLUDES=
OPSFOLIO_EAA_KEY_APIS=
OPSFOLIO_EAA_KEY_GIT_URLS=
OPSFOLIO_EAA_CORSY_PATH=/opt/eaa/Corsy
OPSFOLIO_EAA_WAF_BYPASS_PATH=/opt/eaa/waf-bypass
OPSFOLIO_EAA_WP_TOKEN=
OPSFOLIO_EAA_VIRUSTOTAL_API_KEY=
OPSFOLIO_EAA_RATE_LIMIT=200
OPSFOLIO_EAA_CONCURRENCY=50
OPSFOLIO_EAA_NAABU_PORTS=top-100
OPSFOLIO_EAA_NUCLEI_TEMPLATES=cves,default
EOF

Docker Run

Launch the container.

  1. For Lightweight Testing:
sudo docker run --rm -it \
  --env-file .env \
  -v $(pwd)/.env:/opt/eaa/.env \
  -v $(pwd)/results:/opt/eaa/sessions/ \
  fleetfolio/fleetfolio
  1. For Thorough Testing:
sudo docker run --rm -it \
  --env-file .env \
  -v $(pwd)/.env:/opt/eaa/.env \
  -v $(pwd)/results:/opt/eaa/sessions/ \
  fleetfolio/fleetfolio --graph thorough

By default the docker image is set to scan for lightweight pentesting. To get a thorough pentesting, use the --graph thorough switch.

After execution, a /results directory will be created in your current path containing all generated reports and data.

How is this guide?

Last updated on

On this page