If you only want to use tools, workflows, or toolkits published by other developers on Leviathan, and do not need to perform local testing or development operations (e.g., writing and uploading toolkits) by yourself, then you only need to read the following three parts:
- Docker installation
- SSH configuration(#Personal SSH public key upload)
- talentsec/lev launch(#talentsec/lev launch)
If you are not satisfied with the existing tools and workflows on Leviathan and have confidence in your software devlopment capabilities, the following contents will teach you how to upload your own cybersecurity packages (e.g., tools/workflows) for others to use: