Small, self-contained security labs you can run locally with the Docker CLI (Podman-compatible).
Each lab includes a vulnerable build, a fixed build, and a short walkthrough.
- 🐧 Linux Privilege Escalation (sudo misconfiguration)
- Start as a low-priv user in a container, enumerate, and escalate to
root.
- Start as a low-priv user in a container, enumerate, and escalate to
- 🌐 Web Exploitation (SQL Injection)
- Exploit a vulnerable Flask + SQLite login, then verify the fixed build.
- 📤 Web Exploitation (File Upload)
- Compare weak upload handling vs a strict allowlist + safe storage.
- 🧾 Web Exploitation (IDOR)
- Exploit missing authorization on
/profile/<id>, then verify the fix.
- Exploit missing authorization on
- 🧩 Web Exploitation (PHP Attack Chain)
- See how unsafe upload handling and command execution become compromise.
- 🕸️ Web Exploitation (SSRF)
- Learn why URL-fetch features need strict outbound controls.
- 🔐 Web Exploitation (JWT Auth Pitfalls)
- See how JWT verification mistakes become authorization bypass.
All labs: labs/
- Docker CLI (Podman-compatible):
docker - Basic understanding of container usage (build, run, exec)
- Linux terminal familiarity recommended
These labs are intentionally vulnerable.
- Run locally on a non-production machine.
- Container root is not host root, but it’s still a real security boundary lesson.
This repository may contain intentionally vulnerable applications and exploit simulations demonstrating cybersecurity and DevSecOps concepts.
- Run labs locally (Docker/VMs) in controlled environments
- Test only on systems you own or are authorized to assess
This project reflects practical security research and proof-of-work, and aligns with GitHub policies on dual-use security content. It must not be used for unauthorized access or real-world attacks.
The author is not responsible for misuse.
Each lab directory contains its own README with:
- image build commands (
docker build) - manual run commands (
docker run, ports, network) - exploit walkthrough (manual + optional script)
- secure fixed build/run steps
MIT — see LICENSE.