The Dirtyc0w Docker POC utilizes the dirtyc0w kernel exploit for privilege escalation within a standard nginx image by adding a non-root user named hacker to the exploit files. The POC demonstrates the importance of correct container security and provides insights on mitigating the attack without patching using an AppArmor profile.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Ebowla is a tool for generating payloads in Python, GO, and PowerShell with support for Reflective DLLs.
A C2 front flow control tool designed to evade detection by Blue Teams, AVs, and EDRs.
A tool that finds more information about a given URL or domain by querying multiple data sources.
Full-featured C2 framework for stealthy communication and control on web servers.
A login cracker that can be used to crack many types of authentication protocols.
DET (extensible) Data Exfiltration Toolkit is a proof of concept tool for performing Data Exfiltration using multiple channels simultaneously.
APT Simulator is a tool for simulating a compromised system on Windows.
A repository containing material for Android greybox fuzzing with AFL++ Frida mode
Modular framework for pentesting Modbus protocol with diagnostic and offensive features.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.