Dirtyc0w Docker POC Logo

Dirtyc0w Docker POC

0
Free
Visit Website

The Dirtyc0w Docker POC utilizes the dirtyc0w kernel exploit for privilege escalation within a standard nginx image by adding a non-root user named hacker to the exploit files. The POC demonstrates the importance of correct container security and provides insights on mitigating the attack without patching using an AppArmor profile.

FEATURES

ALTERNATIVES

Generates randomized C2 profiles for Cobalt Strike to evade detection.

Pacu is an open-source AWS exploitation framework for offensive security testing against cloud environments.

Utilizing Alternate Data Streams (ADS) to bypass AppLocker default policies by loading DLL/CPL binaries.

A DNS rebinding exploitation framework

A penetration testing tool for intercepting SSH connections and logging plaintext passwords.

A collection of payloads and methodologies for web pentesting.

A scripting engine for interacting with GraphQL endpoints for pentesting purposes.

A powerful enumeration tool for discovering assets and subdomains.

PINNED