C
Automation for abusing an exposed Docker TCP Socket.
This will automatically create a container on the Docker host with the host's root filesystem mounted, allowing arbitrary read and write of the host filesystem (which is bad).
Once created, the script will employ the method of your choosing for obtaining a root shell. All methods are now working properly, and will return a reverse shell. Chroot is the least disruptive, but Useradd is the default.
Python automation of Docker.sock abuse
https://github.com/AbsoZed/DockerPwn.py