Dirtyc0w Docker POC Logo

Dirtyc0w Docker POC

0
Free
Visit Website

The Dirtyc0w Docker POC utilizes the dirtyc0w kernel exploit for privilege escalation within a standard nginx image by adding a non-root user named hacker to the exploit files. The POC demonstrates the importance of correct container security and provides insights on mitigating the attack without patching using an AppArmor profile.

FEATURES

ALTERNATIVES

High-performant, coroutines-driven, and fully customisable Low & Slow load generator for real-world pentesting with undetectability through Tor.

Linux Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis with various tools and resources.

Macro_Pack is a tool used to automate obfuscation and generation of Office documents for pentest, demo, and social engineering assessments.

Open source application for retrieving passwords stored on a local computer with support for various software and platforms.

Skyhook facilitates obfuscated HTTP file transfers to bypass IDS detections, enhancing secure data exchange.

A visual guide illustrating attack paths and techniques for exploiting vulnerabilities in GitHub Actions configurations.

A collection of tests for Local File Inclusion (LFI) vulnerabilities using Burp Suite.

A Linux-based environment for penetration testing and vulnerability exploitation

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved