TH3xACE / SUDO_KILLERLinks
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
☆2,391Updated last month
Alternatives and similar repositories for SUDO_KILLER
Users that are interested in SUDO_KILLER are comparing it to the libraries listed below
Sorting:
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,779Updated last year
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,906Updated 3 years ago
- A script that you can run in the background!☆2,929Updated last year
- Windows / Linux Local Privilege Escalation Workshop☆2,027Updated 3 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,602Updated 2 months ago
- A curated list of awesome privilege escalation☆1,467Updated 3 months ago
- Red Teaming & Pentesting checklists for various engagements☆2,618Updated 4 months ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,740Updated 3 years ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,593Updated last year
- Monitor linux processes without root permissions☆5,771Updated 2 years ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,341Updated 7 months ago
- Writeups for HacktheBox 'boot2root' machines☆2,002Updated 2 years ago
- Fancy reverse and bind shell handler☆2,843Updated last year
- Next-Generation Linux Kernel Exploit Suggester☆1,944Updated 2 years ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,473Updated 2 months ago
- The ultimate WinRM shell for hacking/pentesting☆5,113Updated 2 months ago
- ☆2,339Updated 2 years ago
- Linux privilege escalation auditing tool☆6,274Updated last year
- Windows Exploit Suggester - Next Generation☆4,696Updated this week
- JAWS - Just Another Windows (Enum) Script☆1,881Updated 4 years ago
- Red Teaming Tactics and Techniques☆4,426Updated last year
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,797Updated last week
- Notes about attacking Jenkins servers☆2,090Updated last year
- A tool to perform Kerberos pre-auth bruteforcing☆3,135Updated last year
- Privilege Escalation Enumeration Script for Windows☆3,546Updated last week
- pwning IPv4 via IPv6☆1,862Updated last year
- Reverse shell generator written in Python 3.☆540Updated 3 months ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,338Updated 2 years ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,915Updated 2 months ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,498Updated 2 years ago