PercussiveElbow / docker-escape-toolLinks
Tool to test if you're in a Docker container and attempt simple breakouts
☆150Updated 3 years ago
Alternatives and similar repositories for docker-escape-tool
Users that are interested in docker-escape-tool are comparing it to the libraries listed below
Sorting:
- Linux privilege escalation via LXD☆141Updated 5 years ago
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆233Updated 4 years ago
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server☆123Updated 3 years ago
- SOCKS5 and HTTP over TURN/STUN proxy☆195Updated 2 years ago
- RCE on Kibana versions before 5.6.15 and 6.6.0 in the Timelion visualizer☆56Updated 6 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆206Updated 2 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆446Updated 3 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆211Updated 5 years ago
- Combined port scanning w/ Masscan's speed & Nmap's scanning features.☆155Updated 3 years ago
- HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Se…☆280Updated 4 years ago
- Source Code Management Attack Toolkit☆225Updated 3 years ago
- Statically built netcat binaries for Linux (other OSes can be added later)☆37Updated 8 years ago
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆366Updated 3 years ago
- ☆576Updated 6 months ago
- Script and resources to execute shell commands using access to a PostgreSQL service☆70Updated 8 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆278Updated 11 months ago
- Shadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious S…☆240Updated 2 years ago
- That repository contains my updates to the well know java deserialization exploitation tool ysoserial.☆184Updated 3 years ago
- Workshop on Template Injection (6 exercises) covering Twig, Jinja2, Tornado, Velocity and Freemaker engines.☆129Updated 3 years ago
- SonicWall SSL-VPN Exploit☆183Updated 4 years ago
- One stop place for Jira security reconnaissance and exploitation in your proximity☆199Updated 2 weeks ago
- Tool to extract Kerberos tickets from Linux kernel keys.☆236Updated 6 years ago
- This is a dockerized application that is vulnerable to the Spring4Shell vulnerability (CVE-2022-22965).☆107Updated 3 years ago
- Exploitation toolkit for RichFaces☆106Updated 2 years ago
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆224Updated 5 years ago
- mRemoteNG Config File Decrypt☆92Updated 3 years ago
- A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read☆217Updated 9 months ago
- Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)☆180Updated 5 years ago
- Peas create serialized payload for deserialization RCE attack on python driven applications where pickle ,pyYAML, ruamel.yaml or jsonpick…☆125Updated 2 years ago
- Root shell PoC for CVE-2021-3156☆156Updated 3 years ago