dEEpEst
☣☣ In The Depths ☣☣
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
- Joined
- Mar 29, 2018
- Messages
- 13,859
- Solutions
- 4
- Reputation
- 27
- Reaction score
- 45,545
- Points
- 1,813
- Credits
- 55,080
7 Years of Service
56%

This repository contains a Docker Remote API Scanner and Exploit tool designed for educational and research purposes. It enables users to perform security assessments and experiments related to Docker container environments.
Features
- Mass scanning and exploitation of Docker hosts
- Interactive mode for manual interactions
- Specify the target Docker API URL
- Input a list of targets from a file
- Generate output for your scans and exploitation results
Usage
To get started, you can use the following command-line options:
- --url URL: Specify the target Docker API URL.
- --file FILE: Specify a file for input, providing a list of target URLs.
- --output OUTPUT: Specify a file for output to save the results of your scans and exploitation.
- --mass-check: Enable mass scanning and exploitation.
- --exploit: Exploit target(s).
- --interact: Enter interactive mode for manual interactions.
Single Scan
python docker_remote_api_exploit.py --url http://127.0.0.1 --output potential.txt
Mass Scan
python docker_remote_api_exploit.py --file targets.txt --mass-check --output potential.txt
Single Exploit
python docker_remote_api_exploit.py --url http://127.0.0.1 --exploit --output exploited.txt
Single Exploit (Interaction Mode)
python docker_remote_api_exploit.py --url http://127.0.0.1 --exploit --interact --output exploited.txt
Mass Exploit
python docker_remote_api_exploit.py --file potential.txt --exploit --outpute[COLOR= rgb( var(--theme-text_color) )] [/COLOR]xploited.txt
Download
To see this hidden content, you must like this content.