Skip to content
Toggle navigation
Sign up
Product
Actions
Automate any workflow
Packages
Host and manage packages
Security
Find and fix vulnerabilities
Codespaces
Instant dev environments
Copilot
Write better code with AI
Code review
Manage code changes
Issues
Plan and track work
Discussions
Collaborate outside of code
Explore
All features
Documentation
GitHub Skills
Blog
Solutions
For
Enterprise
Teams
Startups
Education
By Solution
CI/CD & Automation
DevOps
DevSecOps
Case Studies
Customer Stories
Resources
Open Source
GitHub Sponsors
Fund open source developers
The ReadME Project
GitHub community articles
Repositories
Topics
Trending
Collections
Pricing
In this repository
All GitHub
↵
Jump to
↵
No suggested jump to results
In this repository
All GitHub
↵
Jump to
↵
In this organization
All GitHub
↵
Jump to
↵
In this repository
All GitHub
↵
Jump to
↵
Sign in
Sign up
{{ message }}
cdk-team
/
CDK
Public
Notifications
Fork
461
Star
3.1k
Code
Issues
12
Pull requests
2
Discussions
Actions
Projects
0
Wiki
Security
Insights
More
Code
Issues
Pull requests
Discussions
Actions
Projects
Wiki
Security
Insights
Evaluate: System Info
Jump to bottom
cdxy edited this page
Nov 24, 2020
·
1 revision
Pages
49
Home
CDK Home CN
Developer Document
Evaluate: check net.ipv4.conf.all.route_localnet
Evaluate: Cloud Provider Metadata API
Evaluate: Commands and Capabilities
Evaluate: K8s API Server
Evaluate: k8s mitm clusterip
Evaluate: K8s Service Account
Evaluate: Mounts
Evaluate: Net Namespace
Evaluate: Sensitive Files
Evaluate: Services
Evaluate: System Info
Usage
Output
Exploit: abuse unpriv userns
Exploit: ak leakage
Exploit: cap dac read search
Exploit: check istio
Exploit: check ptrace
Exploit: Container Image Registry Brute
Exploit: docker api pwn
Exploit: docker sock check
Exploit: docker sock pwn
Exploit: k8s backdoor daemonset
Exploit: k8s configmap dump
Exploit: k8s cronjob
Exploit: k8s get sa token
Exploit: k8s psp dump
Exploit: k8s secret dump
Exploit: k8s shadow apiserver
Exploit: lxcfs rw
Exploit: mount cgroup
Exploit: mount disk
Exploit: mount procfs
Exploit: reverse shell
Exploit: rewrite cgroup devices
Exploit: service probe
Exploit: shim pwn
Exploit: webshell deploy
Release
Run Test
Tool: dcurl
Tool: ifconfig
Tool: kcurl
Tool: nc
Tool: probe
Tool: ps
Tool: ucurl
Tool: vi
Show 34 more pages…
Clone this wiki locally
获取容器内的用户、内核、OS信息。
Retrieving current user, kernel, OS information inside container.
Usage
cdk evaluate
Output
You can’t perform that action at this time.
You signed in with another tab or window.
Reload
to refresh your session.
You signed out in another tab or window.
Reload
to refresh your session.