PercussiveElbow / docker-escape-toolLinks
Tool to test if you're in a Docker container and attempt simple breakouts
☆143Updated 2 years ago
Alternatives and similar repositories for docker-escape-tool
Users that are interested in docker-escape-tool are comparing it to the libraries listed below
Sorting:
- Linux privilege escalation via LXD☆134Updated 5 years ago
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆234Updated 3 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆434Updated 2 years ago
- ☆119Updated 2 years ago
- A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read☆216Updated 3 months ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆601Updated 4 years ago
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆129Updated 5 years ago
- Grafana Unauthorized arbitrary file reading vulnerability☆362Updated 2 years ago
- Proof of Concept Exploit for vCenter CVE-2021-21972☆260Updated 4 years ago
- HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Se…☆279Updated 4 years ago
- Source Code Management Attack Toolkit☆219Updated 2 years ago
- A super small jsp webshell with file upload capabilities.☆300Updated 3 years ago
- Root shell PoC for CVE-2021-3156☆151Updated 3 years ago
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆348Updated 2 years ago
- Combined port scanning w/ Masscan's speed & Nmap's scanning features.☆153Updated 3 years ago
- Tool to extract Kerberos tickets from Linux kernel keys.☆228Updated 6 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆143Updated 3 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation☆211Updated 3 years ago
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server☆122Updated 3 years ago
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆220Updated 4 years ago
- Script and resources to execute shell commands using access to a PostgreSQL service☆69Updated 7 years ago
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆107Updated 4 years ago
- SOCKS5 and HTTP over TURN/STUN proxy☆180Updated last year
- ☆162Updated 2 months ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆178Updated 2 years ago
- Statically built netcat binaries for Linux (other OSes can be added later)☆35Updated 7 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆203Updated 2 years ago
- ☆160Updated 3 years ago
- cve-2020-0688☆324Updated last year