Dirtyc0w Docker POC Logo

Dirtyc0w Docker POC

0
Free
Visit Website

The Dirtyc0w Docker POC utilizes the dirtyc0w kernel exploit for privilege escalation within a standard nginx image by adding a non-root user named hacker to the exploit files. The POC demonstrates the importance of correct container security and provides insights on mitigating the attack without patching using an AppArmor profile.

FEATURES

ALTERNATIVES

Maintaining account persistence via XSS and Oauth

A simple SSRF-testing sheriff written in Go

A tool for detecting and taking over subdomains with dead DNS records

Pacu is an open-source AWS exploitation framework for offensive security testing against cloud environments.

Collection of Return-Oriented Programming challenges for practicing exploitation skills.

A modern post-exploitation command and control framework with a client-server architecture and extensibility features.

A tool that scans for accessibility tools backdoors via RDP

Chameleon aids in evading proxy categorization to bypass internet filters.