Dirtyc0w Docker POC Logo

Dirtyc0w Docker POC

0
Free
Visit Website

The Dirtyc0w Docker POC utilizes the dirtyc0w kernel exploit for privilege escalation within a standard nginx image by adding a non-root user named hacker to the exploit files. The POC demonstrates the importance of correct container security and provides insights on mitigating the attack without patching using an AppArmor profile.

FEATURES

ALTERNATIVES

Open-source Java application for creating proxies for traffic analysis & modification.

A comprehensive .NET post-exploitation library designed for advanced security testing.

Adversary emulation framework for testing security measures in network environments.

Back-end component for red team operations with crucial design considerations.

A subdomain enumeration tool for penetration testers and security researchers.

Create a vulnerable active directory for testing various Active Directory attacks.

A C2 front flow control tool designed to evade detection by Blue Teams, AVs, and EDRs.

A collection of Python scripts for password spraying attacks against Lync/S4B & OWA, featuring Atomizer, Vaporizer, Aerosol, and Spindrift tools.