<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Dockerfile on HackyFeed</title><link>https://rainmana.github.io/hackyfeed/tags/dockerfile/</link><description>Recent content in Dockerfile on HackyFeed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rainmana.github.io/hackyfeed/tags/dockerfile/feed.xml" rel="self" type="application/rss+xml"/><item><title>Awesome-RCE-techniques</title><link>https://rainmana.github.io/hackyfeed/tools/p0dalirius-awesome-rce-techniques/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/p0dalirius-awesome-rce-techniques/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Awesome RCE Techniques&amp;rdquo; repository is an open-source knowledge database that compiles various methods for achieving Remote Code Execution (RCE) across different applications. It features a collection of 24 RCE techniques categorized by platform type, including Content Management Systems and frameworks, each accompanied by Docker images for practical training and testing. This resource facilitates learning and experimentation for security professionals and developers interested in RCE dynamics.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="awesome-rce-techniques"&gt;Awesome RCE techniques&lt;/h1&gt;
&lt;p align="center"&gt;
 Awesome list of techniques to achieve Remote Code Execution (RCE) on various apps!
 &lt;br&gt;
 &lt;img alt="Number of RCE techniques" src="https://img.shields.io/badge/techniques-24-brightgreen"&gt;
 &lt;a href="https://twitter.com/intent/follow?screen_name=podalirius_" title="Follow"&gt;&lt;img src="https://img.shields.io/twitter/follow/podalirius_?label=Podalirius&amp;style=social"&gt;&lt;/a&gt;
 &lt;a href="https://www.youtube.com/c/Podalirius_?sub_confirmation=1" title="Subscribe"&gt;&lt;img alt="YouTube Channel Subscribers" src="https://img.shields.io/youtube/channel/subscribers/UCF_x5O7CSfr82AfNVTKOv_A?style=social"&gt;&lt;/a&gt;
 &lt;br&gt;
&lt;/p&gt;</description></item><item><title>offensive-docker</title><link>https://rainmana.github.io/hackyfeed/tools/aaaguirrep-offensive-docker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/aaaguirrep-offensive-docker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Offensive Docker is a Docker image designed to facilitate the rapid setup of a penetration testing environment by bundling a comprehensive suite of commonly used security tools. Its primary use case is to streamline the pentesting process, featuring tools for port scanning, reconnaissance, web application testing, and brute-forcing, among others. Notably, it allows users to quickly deploy a fully equipped pentesting environment in various cloud platforms, enhancing efficiency in security assessments.&lt;/p&gt;</description></item></channel></rss>