Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for docker exploitation
docker
x
exploitation
x
19 search results found
Cdk
⭐
3,267
📦 Make security testing of K8s, Docker, and Containerd easier.
100 Redteam Projects
⭐
1,661
Projects for security students
Poshc2
⭐
1,645
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
Pythem
⭐
1,172
pentest framework
Deepce
⭐
1,040
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
Iot Vulhub
⭐
1,027
IoT固件漏洞复现环境
Like Dbg
⭐
713
Fully dockerized Linux kernel debugging environment
Jok3r
⭐
564
Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Cve 2019 5736 Poc
⭐
551
PoC for CVE-2019-5736
Exploit Cve 2016 10033
⭐
387
PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container
Docker Hacklab
⭐
324
My personal hacklab, create your own.
Ropium
⭐
314
ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together
Pwnbox
⭐
303
Docker container with tools for binary reverse engineering and exploitation.
Ccat
⭐
238
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Pwn_docker_example
⭐
156
Example pwnable challenge hosted with docker
Exploit Cve 2014 6271
⭐
155
Shellshock exploit + vulnerable environment
Pakuri
⭐
140
PAKURI has been merged with Python and launched as a new project, PAKURI-THON.
Search Libc
⭐
137
Web wrapper of niklasb/libc-database
Spoolsploit
⭐
127
A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.
Bodhi
⭐
92
Bodhi - Client-side Vulnerability Playground
Docker Vulnerable Dvwa
⭐
85
Damn Vulnerable Web Application Docker container
Apachecn Sec Zh
⭐
80
ApacheCN 网络安全译文集
Shocker
⭐
69
Shocker / Docker Breakout PoC
Resto
⭐
56
A metadata catalog and search engine for geospatialized data
Pwnableharness
⭐
52
Manage building and deploying exploitation challenges with ease
Cve 2017 13089
⭐
51
PoC for wget v1.19.1
Exploit Cve 2015 3306
⭐
50
ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container
Dockerexploit
⭐
50
Docker Remote API Scanner and Exploit
Mikrotiksploit
⭐
46
MikrotikSploit is a script that searches for and exploits Mikrotik network vulnerabilities
Exploit Cve 2016 6515
⭐
44
OpenSSH remote DOS exploit and vulnerable container
Docker Metasploit
⭐
43
Metasploit framework with steroids
Exploit Cve 2016 9920
⭐
34
Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container
Docker Npmrc Security
⭐
27
.npmrc files are often used insecurely in Docker images. Use multi-stage builds or Docker build secrets to protect your .nrpmc files.
Exploit Cve 2015 1427
⭐
22
Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container
Dockerevil
⭐
22
My security researches involving Docker and Openshift
Exploit Cve 2016 7434
⭐
21
NTPD remote DOS exploit and vulnerable container
Kali Linux Dockerfile
⭐
20
A simple Dockerfile to build an image starting from the latest official one of Kali Linux and including some useful tools.
Webmap
⭐
19
Nmap Web Interface including XML parsing, maps and reports
Docker Esa Snap
⭐
15
ESA Sentinel and SMOS Toolboxes preinstalled container for Earth Observation processing and analysis.
Mypwndock
⭐
14
My customized docker image used for binary exploitation and RE
Pil Rce Ghostscript Cve 2018 16509
⭐
14
PoC + Docker Environment for Python PIL/Pillow Remote Shell Command Execution via Ghostscript CVE-2018-16509
Lua Sandbox Escape
⭐
13
Lempo
⭐
11
LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberia 2018
Exploit Phpldapadmin Remote Dump
⭐
11
phpldapadmin remote exploit and vulnerable container !
Ed
⭐
10
Ed is a tool used to identify and exploit accessible UNIX Domain Sockets
Intro To Chrome Exploitation
⭐
10
Class materials from OWASP Portland 2019
Esa Snap With Python
⭐
10
ESA SNAP with Python and Snappy module preinstalled container for automated processing and analysis
Exim Rce Cve 2018 6789
⭐
8
This repository provides a learning environment to understand how an Exim RCE exploit for CVE-2018-6789 works.
Gevaudan
⭐
8
Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!
Pwn Docker
⭐
8
Collection of docker images to be used for exploit development and testing
Privesc Cve 2015 5602
⭐
7
Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container
Exploitableapp
⭐
7
A .NET core project for web based pen testing
Empire
⭐
6
:godmode: Empire (https://github.com/EmpireProject/Empire) dockerized
Scan Cve 2018 8115
⭐
6
Docker Spectre
⭐
5
Spectre and Meltdown in a docker containerized test
Pentest In Docker
⭐
5
Docker image to exploit RCE, try for pentest methods and test container security solutions (trivy, falco and etc.)
Docker Imagetragick
⭐
5
Dirty Cow Poc
⭐
5
Dirtyc0w Docker POC
Dagro Hacks
⭐
5
Hacking cheap IP cameras for fun and ECTS!
Exploit 0x41 Buffer Overflow
⭐
5
Exploit Development 0x41: Buffer Overflooooooooooow
Privesc Cve 2010 0426
⭐
5
Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container
Related Searches
Shell Docker (20,660)
Docker Dockerfile (16,395)
Python Docker (14,963)
Javascript Docker (10,426)
Golang Docker (7,189)
Php Docker (6,192)
Java Docker (6,071)
Docker Nginx (5,238)
Docker Kubernetes (4,985)
Typescript Docker (4,630)
1-19 of 19 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.