Skip to content

start action

This action can be used to start a container. At least one Exegol image is required to create and start a container and enjoy Exegol. Installing an image can be done with exegol install documentation here.

When this action is used, the following process is applied:

  • if no Exegol image is installed, the user is asked to specify which one to install of build, and the process continues
  • then, if the container to start doesn't already exist, it is created based on an Exegol image and a few settings to specify, and the process continues
  • then, the container is started and a shell is opened

Options

A single option exist to target an Exegol container. If this container exists, it will be started if it is not already the case and a shell will be spawned to offer an interactive console to the user

OptionDescription
CONTAINERTag used to target an Exegol container

Many options exist to customize the creation of exegol container.

TIP

The default options of some parameters can be changed in the exegol configuration file.

Global options

OptionDescription
IMAGETag of the exegol image to use to create a new exegol container
-w WORKSPACE_PATH, --workspace WORKSPACE_PATHThe specified host folder will be linked to the /workspace folder in the container.
-cwd, --cwd-mountThis option is a shortcut to set the /workspace folder to the user's current working directory (pwd).
-fs, --update-fsModifies the permissions of folders and sub-folders shared in your workspace to access the files created within the container using your host user account. (default: Disabled)
-V VOLUMES, --volume VOLUMESShare a new volume between host and exegol (format: --volume /path/on/host/:/path/in/container/[:ro|rw]).
-p PORTS, --port PORTSShare a network port between host and exegol (format: --port [<host_ipv4>:]<host_port>[-<end_host_port>][:<container_port>[-<end_container_port>]][:<protocol>]. This configuration will disable the shared network with the host.
--hostname HOSTNAMESet a custom hostname to the exegol container (default: exegol-<name>)
--disable-X11Disable X11 sharing to run GUI-based applications. (default: Enabled)
--disable-my-resourcesDisable the mount of the shared resources (/opt/my-resources) from the host (/home/dramelac/.exegol/my-resources) (default: Enabled)
--disable-exegol-resourcesDisable the mount of the exegol resources (/opt/resources) from the host (/home/dramelac/Documents/tools/Exegol/exegol-resources) (default: Enabled)
--network NETWORKNew! Configure the container's network mode (default: host). See Network Modes for details.
--disable-shared-timezonesDisable the sharing of the host's time and timezone configuration with exegol (default: Enabled)

Privileges

By default, the Exegol container will receive the minimum permissions required by the enabled features.

Automatic permissions

Permissions will be added automatically if required. For example, when the --vpn parameter is used, devices and capabilities are automatically added to enable the VPN to operate with the least privileges possible.

OptionDescription
-d DEVICES, --device DEVICESAdd host device(s) at the container creation (example: -d /dev/ttyACM0 -d /dev/bus/usb/).
--cap CAPABILITIES(dangerous) Capabilities allow to add specific privileges to the container (e.g. need to mount volumes, perform low-level operations on the network, etc).
--privileged(dangerous) Give extended privileges at the container creation (e.g. needed to mount things, to use Wi-Fi or Bluetooth)
Avoid using privileged mode unless absolutely necessary

This flag grants the container nearly unrestricted access to the host, effectively breaking most security boundaries Docker puts in place (all Linux kernel capabilities are enabled; seccomp, AppArmor and SELinux protections are disabled; the container can access all host devices; and major mounts become read-write).

New container

When a new container is created, it is possible to:

  • Add the specific capabilities needed with --cap, among the following list: NET_ADMIN, NET_BROADCAST, SYS_MODULE, SYS_PTRACE, SYS_RAWIO, SYS_ADMIN, LINUX_IMMUTABLE, MAC_ADMIN, SYSLOG. ALL is a special value that sets them all (all capabilities supported by Docker, read more).
  • Identify which devices are required and add specific devices with -d/--device.
  • If you need "root access" (i.e., all capabilities, and access to all devices, hardware and kernel of the host) the --privileged option can be used.
WARNING

The privileges configured when creating the container will be given to all processes in that container for the entirety of its lifetime.

Existing container New!

When the container already exists, you cannot change the default privileges mode, capabilities or share new devices. However, it is possible to spawn a single shell session with all capabilities with --cap ALL. The capabilities won't be added to the container itself and will only be valid for the specific shell the flag was enabled for.

Network modes New!

Exegol supports different network modes to suit various use cases:

ModeDescriptionUse Case
host (default)Container shares the host's network interfaces (IP and MAC addresses of every interface of your host).- When you need to use the host's network interfaces directly
- For low-level network operations
- When you need to share the host's IP and MAC address
dockerContainer uses Docker's default bridge network. All containers (not just Exegol) share this network and can communicate with each other.- When you need basic network isolation
- When you want to publish specific ports
- For most standard use cases
- When you want to allow communication between containers
natPro Creates a dedicated isolated network for the container with its own subnet. Each container gets a unique network namespace with a /28 subnet (16 IP addresses), providing complete isolation from other containers. Requires Pro/Enterprise license.- When you need complete network isolation
- For sensitive operations requiring dedicated network resources
- When you need to control all network traffic
- When you want automatic network cleanup on container removal
disableDisables all network connectivity for the container.- When you need maximum isolation
- For offline operations
- When network access is not required
CAUTION

OrbStack currently has a known limitation where containers connected to different user-defined networks can communicate with each other, bypassing expected network isolation obtained with the nat option. See the issue for more information orbstack/orbstack#1944, as of 21/05/2025, it's considered as intended and "won't fix".

There are some limitations and considerations that users should be aware of:

  • Port Publishing: When using host mode, the --port option is not possible, and unnecessary since the container already has direct access to all host network interfaces and ports. Any service running in the container will be automatically accessible on the host's network.
  • Docker Desktop: On Windows and macOS systems using Docker Desktop, host mode has reduced functionality:
    • Limited access to host network interfaces
    • Potential performance impact
    • May not work as expected with certain network tools

The network behavior can be configured in your Exegol configuration file (~/.exegol/config.yml). See the network configuration section in the configuration documentation for details about network settings.

Graphical desktop

As an alternative to X11 sharing, Exegol provides a complete graphical desktop environment within the container. This environment can be accessed through multiple protocols, with a web-based interface being the default method. This gives users a full-featured desktop experience directly from their browser.

OptionDescription
--desktopEnable or disable the Exegol desktop feature (default: Disabled)
--desktop-configConfigure the desktop protocol (vnc/http) and network settings (format: protocol[:ip[:port]]) (default: http:127.0.0.1:<random>)

VPN

An additional feature of Exegol is the managed VPN tunnel. Compatible with OpenVPN and WireGuard since Exegol image version 3.1.8.

  • To configure an OpenVPN tunnel, your configuration file must have the .ovpn extension or the directory must contain an .ovpn file.
  • To configure a WireGuard VPN, your configuration file must have the .conf extension.

The container will take care of starting the tunnel at each startup.

WrireGuard support

WireGuard VPN support is currently in beta and exclusive to Pro and Enterprise users at this time.

INFO

When using the --vpn feature, network mode defaults to docker, or nat if the user has a valid Pro or Enterprise subscription. This isolates the container. The VPN connection is not opened directly on the host's network interface. It protects the host.

OptionDescription
--vpn VPNSetup an OpenVPN or WireGuard connection at the container creation (examples: --vpn /home/user/openvpn/conf.ovpn, --vpn /home/user/wireguard.conf)
--vpn-auth VPN_AUTHEnter the credentials with a file (first line: username, second line: password) to establish the VPN connection automatically (example: --vpn-auth /home/user/openvpn/auth.txt)
IMPORTANT

All the options seen previously are taken into account only for the creation of a new container. It is not possible to modify the configuration of an existing container. These options will be ignored if a container with the same name already exists.

Shell logging

One of the functions of exegol very useful in a professional context is the shell logging. This feature allows the user to record everything that happens in the exegol container (commands typed and responses).

OptionDescription
-l, --logEnable shell logging (commands and outputs) on exegol to /workspace/logs/ (default: Disabled)
--log-methodSelect a shell logging method used to record the session (default: asciinema)
--log-compressEnable or disable the automatic compression of log files at the end of the session (default: Enabled)
TIP

When the -l/--log option is enabled during the creation of a new container, all future shells will be automatically logged for this container.

Session specific

The options specific to the start of the interactive session.

OptionDescription
-e ENVS, --env ENVSAnd an environment variable on Exegol (format: --env KEY=value). The variables configured during the creation of the container will be persistent in all shells. If the container already exists, the variable will be present only in the current shell.
-s SHELL, --shell SHELLSelect a shell environment to launch at startup (default: zsh)
INFO

The environment variables configured with --env ENVS during the creation of a new container will be available to all processes of the container during the entire life cycle of the container.

Command examples

bash
# Start interactively a container
exegol start

# Create a demo container using full image
exegol start demo full

# Spawn a shell from demo container
exegol start demo

# Create a container test with a custom shared workspace
exegol start test full -w "./project/pentest/"

# Create a container test sharing the current working directory
exegol start test full -cwd

# Create a container htb with a VPN
exegol start htb full --vpn "~/vpn/lab_Dramelac.ovpn"

# Create a container app with custom volume
exegol start app full -V "/var/app/:/app/"

# Get a shell based on tmux
exegol start --shell tmux

# Share a specific hardware device (like Proxmark)
exegol start -d "/dev/ttyACM0"

# Share every USB device connected to the host
exegol start -d "/dev/bus/usb/"

Last updated: