The toolkit is statically compiled so it can be run directly from the container:
docker run -it --rm -v "$(pwd)/work:/work" \
atorrescogollo/offensive-tor-toolkit:<VERSION>
For example, to check if you can access Tor from the container, execute the following tool:
$ /dist/check-tor-connection
...
Title: Congratulations. This browser is configured to use Tor.
Closing Tor
Write line: SIGNAL HALT
Read line: 250 OK
Write line: QUIT
Build your own Docker image
Probably is a good idea to have multiple tools inside a single Docker image. To include the Offensive Tor Toolkit inside your custom image you can use a multi-stage build:
# Dockerfile
FROM atorrescogollo/offensive-tor-toolkit:<VERSION> as ott
FROM kalilinux/kali-rolling:latest
COPY --from=ott /dist /opt/offensive-tor-toolkit