Privilege escalation in Docker
☆32Jun 30, 2022Updated 3 years ago
Alternatives and similar repositories for docker-privesc
Users that are interested in docker-privesc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Command-line client to interact with Hack The Box☆16Apr 9, 2020Updated 6 years ago
- Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container☆11Dec 16, 2017Updated 8 years ago
- ☆13Mar 31, 2023Updated 3 years ago
- Docker config and shell manager for using (or misusing) containers as dev environments☆18Dec 5, 2025Updated 5 months ago
- Hackthebox tools☆13Mar 3, 2019Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆18Apr 22, 2024Updated 2 years ago
- ☆12Jan 28, 2023Updated 3 years ago
- Encryption which converts English characters to unicode characters that mimicking their appearance☆12Sep 17, 2017Updated 8 years ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- Collection of scripts that I have used on Red Team engagements☆16Feb 15, 2018Updated 8 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- CVE-2021-40438 exploit PoC with Docker setup.☆12Oct 24, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆33Jun 28, 2022Updated 3 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆15Sep 9, 2012Updated 13 years ago
- My experiments in weaponizing ONOS applications (https://github.com/opennetworkinglab/onos)☆20Nov 10, 2024Updated last year
- ☆12Jul 6, 2024Updated last year
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆64Nov 16, 2022Updated 3 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Tool to enable blind sql injection attacks against websockets using sqlmap☆66Apr 30, 2025Updated last year
- The Web Security Testing Guide is a comprehensive open source guide to testing the security of web applications and web services.☆31Oct 27, 2025Updated 6 months ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- ☆14Sep 30, 2025Updated 7 months ago
- minimalist sudo alternative: multi-user privilege escalation tool in three letters☆10Jul 5, 2022Updated 3 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- Corona Invader is a replica of the famous Space Invader, with a twist. In the game, you impersonate the Unites States, and you will have …☆12Sep 10, 2020Updated 5 years ago
- PwnWiki - The notes section of the pentesters mind.☆11Nov 16, 2016Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- Differents WebShell usefull for CTF☆12Jul 21, 2017Updated 8 years ago
- Exercise files to accompany my Pluralsight course☆16May 7, 2025Updated 11 months ago
- A python script for easy static analysis and automatic signature generation of malware.☆12Sep 30, 2013Updated 12 years ago
- Escalation of privilege exploit for Dell BIOS flasher (Flash64W) (2017)☆13Dec 7, 2020Updated 5 years ago
- ☸️🚀🏗️A bit automation with Terraform to provision an EC2 instance (infrastructure as Code) on AWS and using Ansible to install Docker o…☆18Dec 1, 2021Updated 4 years ago
- ☆10Aug 17, 2021Updated 4 years ago