Dirtyc0w Docker POC Logo

Dirtyc0w Docker POC

0
Free
Updated 11 March 2025
Visit Website

The Dirtyc0w Docker POC utilizes the dirtyc0w kernel exploit for privilege escalation within a standard nginx image by adding a non-root user named hacker to the exploit files. The POC demonstrates the importance of correct container security and provides insights on mitigating the attack without patching using an AppArmor profile.

FEATURES

SIMILAR TOOLS

Ebowla is a tool for generating payloads in Python, GO, and PowerShell with support for Reflective DLLs.

A C2 front flow control tool designed to evade detection by Blue Teams, AVs, and EDRs.

A tool that finds more information about a given URL or domain by querying multiple data sources.

Full-featured C2 framework for stealthy communication and control on web servers.

A login cracker that can be used to crack many types of authentication protocols.

DET (extensible) Data Exfiltration Toolkit is a proof of concept tool for performing Data Exfiltration using multiple channels simultaneously.

APT Simulator is a tool for simulating a compromised system on Windows.

A repository containing material for Android greybox fuzzing with AFL++ Frida mode

Modular framework for pentesting Modbus protocol with diagnostic and offensive features.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved