DockerExploit: Docker Remote API Scanner and Exploit
Docker Remote API Scanner and Exploit
This repository contains a Docker Remote API Scanner and Exploit tool designed for educational and research purposes. It enables users to perform security assessments and experiments related to Docker container environments.
Features
- Mass scanning and exploitation of Docker hosts
- Interactive mode for manual interactions
- Specify the target Docker API URL
- Input a list of targets from a file
- Generate output for your scans and exploitation results
Install
git clone https://github.com/justakazh/DockerExploit.git
Use
To get started, you can use the following command-line options:
--url URL
: Specify the target Docker API URL.--file FILE
: Specify a file for input, providing a list of target URLs.--output OUTPUT
: Specify a file for output to save the results of your scans and exploitation.--mass-check
: Enable mass scanning and exploitation.--exploit
: Exploit target(s).--interact
: Enter interactive mode for manual interactions.
Single Scan
python docker_remote_api_exploit.py –url http://127.0.0.1 –output potential.txt
Mass Scan
python docker_remote_api_exploit.py –file targets.txt –mass-check –output potential.txt
Single Exploit
python docker_remote_api_exploit.py –url http://127.0.0.1 –exploit –output exploited.txt
Single Exploit (Interaction Mode)
python docker_remote_api_exploit.py –url http://127.0.0.1 –exploit –interact –output exploited.txt
Mass Exploit
python docker_remote_api_exploit.py –file potential.txt –exploit –output exploited.txt
Copyright (c) 2023 Justakazh
Source: https://github.com/justakazh/