
How to Install PowerShell on Kali Linux
June 30, 2025
CVE-2025-32463: Testing Sudo Chroot Privilege Escalation Vulnerability
July 2, 2025Run Bug Bounty Recon in Docker with MagicRecon + Kali Linux
Want to isolate your bug bounty recon tools from your main system? Docker makes it dead simple. In this post, we’ll spin up a lightweight Kali Linux container, clone MagicRecon
, and run full recon scans in a safe, disposable environment.
🐳 Why Use Docker for Recon Tools?
🛡️ Ethical Use Reminder: All tools and techniques discussed in this post are intended for ethical, legal, and educational use only. Only perform security testing on systems you own or have explicit permission to test. This content is for researchers, students, and professionals following responsible disclosure and legal guidelines.
Docker lets you run a clean, isolated environment for hacking tools. No mess on your system. No version conflicts. No worrying about what the install script is really doing. It’s like a throwaway virtual machine that launches in seconds.
MagicRecon is a recon automation script that wraps tools like subfinder
, httpx
, nuclei
, and more. Running it inside Docker keeps your host clean while giving you full power.
🛠️ Create the Dockerfile
Start by creating a new folder to hold your Docker build files:
Now create a file called Dockerfile
inside that folder with the following content:
This creates a custom Kali-based Docker image with MagicRecon cloned and ready to run inside /opt/magicrecon
.
📦 Build the Docker Image
Inside the same folder, run the following to build your Docker image:
This tags your image as magicrecon
so you can easily run it later.
🚀 Run MagicRecon in Docker
Launch the container interactively:
This drops you into a Kali shell with MagicRecon ready inside /opt/magicrecon
. To view the contents, run:
🔧 Install the Tools
Inside the container, run the setup script:
This installs all dependencies MagicRecon needs, including subfinder
, httpx
, nuclei
, and more.
🕵️ Run a Recon Scan
To start scanning a domain, use:
Replace example.com
with your target. MagicRecon will automate the subdomain enumeration, HTTP probing, and vulnerability scanning steps for you.
💾 Save Output to Host
To keep scan results even after the container exits, mount a volume:
This saves the output to ~/magicrecon-output
on your host.
📦 Conclusion
This setup gives you a clean, isolated Kali container running a powerful recon toolkit. No risk of breaking your host, no cluttered installs, and full control over your recon workflow. Perfect for bug bounty hunters, pentesters, and security enthusiasts who want to run fast, disposable scans.
If you type “exit”To get back in: Just re-run your container:
- Try and if you’re curious you can also tweak the Dockerfile to add tools like
amass
,naabu
, or your own scripts for even more firepower.
⭐ Ready for a reliable, high-performance VPS at an unbeatable price? We host our own Kali labs on Hostinger: 4 vCPU, NVMe storage, 16 GB RAM and 16 TB bandwidth, backed by 24/7 support and a 30-day money-back guarantee. You’ll save up to 20% when you lock in a 24-month plan. Grab a Hostinger VPS using this referral link and support our content.
👉 Claim your Hostinger VPS (from only US$ 7.99/mo)