• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

container

  1. itsMe

    SecretScanner v1.0.8 - Find secrets and passwords in container images and file systems

    What are Secrets? Secrets are any kind of sensitive or private data which gives authorized users permission to access critical IT infrastructure (such as accounts, devices, network, cloud-based services), applications, storage, databases, and other kinds of critical data for an organization...
  2. itsMe

    IPS Post Container Advanced Info

    About This File Plugin to add reputation information, days won, etc. to the user's dashboard in the topics. There are settings for selecting the desired display elements. The settings are divided into two sections – Abbreviated and Full. Include:     Standard design of the Post Container...
  3. itsMe

    CDK - Zero Dependency Container Penetration Toolkit

    Legal Disclaimer Usage of CDK for attacking targets without prior mutual consent is illegal. CDK is for security testing purposes only. Overview CDK is an open-sourced container penetration toolkit, designed for offering stable exploitation in different slimmed containers without any OS...
  4. itsMe

    [BlackHat tool] BOtB v1.8 - A container analysis and exploitation tool

    Break out the Box (BOtB) BOtB is a container analysis and exploitation tool designed to be used by pentesters and engineers while also being CI/CD friendly with common CI/CD technologies. What does it do? BOtB is a CLI tool which allows you to:     Exploit common container vulnerabilities...
  5. 1

    Exploits Docker Container Escape

    Proof of concept instructions to exploit a Docker container escape vulnerability. View the full article
  6. 1

    Exploits runc Container Breakout

    This is exploit code for CVE-2019-5736 (and it works for both runc and LXC). The simplest way to use it is to copy the exploit code into an existing container, and run make.sh. However, you could just as easily create a bad image and run that. This affects runc versions prior to 1.0-rc6 (Docket...
Back
Top