Repository: gebl/dirtycow-docker-vdso
Branch: main
Commit: e3add90893d7
Files: 4
Total size: 886 B
Directory structure:
gitextract_hb6k_l3h/
├── Dockerfile
├── README.md
├── docker-compose.yml
└── runnit.sh
================================================
FILE CONTENTS
================================================
================================================
FILE: Dockerfile
================================================
FROM ubuntu:14.04
RUN apt-get update
RUN apt-get install -y build-essential
RUN apt-get install -y nasm
RUN apt-get install -y git
RUN mkdir /dirtycow-vdso
RUN git clone https://github.com/scumjr/dirtycow-vdso.git /dirtycow-vdso
ADD runnit.sh /
RUN chmod 755 /runnit.sh
EXPOSE 1234
CMD ["/runnit.sh"]
================================================
FILE: README.md
================================================
# dirtycow-docker-vdso
This repository is the necessary bits to get the vdso based Dirty Cow POC working inside a docker container. All the really exciting stuff was done by Scumjr, see his POC repo over at https://github.com/scumjr/dirtycow-vdso.
There is also a writeup and youtube video of using the above exploit to break out of a docker container on my blog:
https://blog.paranoidsoftware.com/dirty-cow-cve-2016-5195-docker-container-escape/
cheers!
================================================
FILE: docker-compose.yml
================================================
version: '2'
services:
dirtycow:
build: .
restart: unless-stopped
================================================
FILE: runnit.sh
================================================
#!/bin/bash
cd /dirtycow-vdso
make
gitextract_hb6k_l3h/ ├── Dockerfile ├── README.md ├── docker-compose.yml └── runnit.sh
Condensed preview — 4 files, each showing path, character count, and a content snippet. Download the .json file or copy for the full structured content (1K chars).
[
{
"path": "Dockerfile",
"chars": 304,
"preview": "FROM ubuntu:14.04\n\nRUN apt-get update\nRUN apt-get install -y build-essential\nRUN apt-get install -y nasm\nRUN apt-get ins"
},
{
"path": "README.md",
"chars": 468,
"preview": "# dirtycow-docker-vdso\n\nThis repository is the necessary bits to get the vdso based Dirty Cow POC working inside a docke"
},
{
"path": "docker-compose.yml",
"chars": 77,
"preview": "version: '2'\nservices:\n dirtycow:\n build: .\n restart: unless-stopped\n\n"
},
{
"path": "runnit.sh",
"chars": 37,
"preview": "#!/bin/bash\n\ncd /dirtycow-vdso\nmake\n\n"
}
]
About this extraction
This page contains the full source code of the gebl/dirtycow-docker-vdso GitHub repository, extracted and formatted as plain text for AI agents and large language models (LLMs). The extraction includes 4 files (886 B), approximately 368 tokens. Use this with OpenClaw, Claude, ChatGPT, Cursor, Windsurf, or any other AI tool that accepts text input. You can copy the full output to your clipboard or download it as a .txt file.
Extracted by GitExtract — free GitHub repo to text converter for AI. Built by Nikandr Surkov.