First run "docker-compose up -d", this starts a minimal vulnerable HTTPS server
Then run "./exploit.sh" and this should exploit and dump the received data