Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.
Boost Your VisibilityA cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments
A collection of tips and tricks for container and container orchestration hacking
Utilizes dirtyc0w kernel exploit for privilege escalation in a Docker container.