TH3xACE / SUDO_KILLERLinks
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
☆2,338Updated last month
Alternatives and similar repositories for SUDO_KILLER
Users that are interested in SUDO_KILLER are comparing it to the libraries listed below
Sorting:
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,650Updated last year
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,873Updated 2 years ago
- A curated list of awesome privilege escalation☆1,370Updated last year
- Windows / Linux Local Privilege Escalation Workshop☆1,973Updated 2 years ago
- Fancy reverse and bind shell handler☆2,763Updated 11 months ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,683Updated 3 years ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,302Updated 2 months ago
- A script that you can run in the background!☆2,867Updated 11 months ago
- Next-Generation Linux Kernel Exploit Suggester☆1,922Updated 2 years ago
- Writeups for HacktheBox 'boot2root' machines☆1,966Updated last year
- Linux privilege escalation auditing tool☆6,034Updated last year
- Privilege Escalation Project - Windows / Linux / Mac☆2,557Updated 9 months ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,522Updated 7 months ago
- Windows Exploit Suggester - Next Generation☆4,518Updated last week
- Red Teaming & Pentesting checklists for various engagements☆2,570Updated 10 months ago
- A tool to perform Kerberos pre-auth bruteforcing☆2,975Updated 10 months ago
- The ultimate WinRM shell for hacking/pentesting☆4,922Updated 7 months ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,445Updated 2 years ago
- Monitor linux processes without root permissions☆5,539Updated 2 years ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,356Updated 3 months ago
- JAWS - Just Another Windows (Enum) Script☆1,800Updated 4 years ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,210Updated 2 years ago
- Privilege Escalation Enumeration Script for Windows☆3,357Updated last week
- offsec batteries included☆1,566Updated last year
- pwning IPv4 via IPv6☆1,813Updated last year
- Red Teaming Tactics and Techniques☆4,307Updated 10 months ago
- ☆2,275Updated last year
- ☆1,160Updated 8 years ago
- Reverse shell generator written in Python 3.☆530Updated last year
- CeWL is a Custom Word List Generator☆2,283Updated 8 months ago