TH3xACE / SUDO_KILLER
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
☆2,295Updated 3 months ago
Alternatives and similar repositories for SUDO_KILLER:
Users that are interested in SUDO_KILLER are comparing it to the libraries listed below
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,562Updated last year
- A script that you can run in the background!☆2,830Updated 8 months ago
- Fancy reverse and bind shell handler☆2,723Updated 7 months ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,631Updated 3 years ago
- Monitor linux processes without root permissions☆5,314Updated 2 years ago
- Linux privilege escalation auditing tool☆5,863Updated last year
- A tool to perform Kerberos pre-auth bruteforcing☆2,845Updated 7 months ago
- Windows / Linux Local Privilege Escalation Workshop☆1,933Updated 2 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,370Updated 9 months ago
- The ultimate WinRM shell for hacking/pentesting☆4,775Updated 4 months ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,838Updated 2 years ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,501Updated 5 months ago
- Red Teaming & Pentesting checklists for various engagements☆2,531Updated 7 months ago
- ☆2,224Updated last year
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆2,512Updated 4 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,452Updated 4 months ago
- Next-Generation Linux Kernel Exploit Suggester☆1,896Updated 2 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,238Updated 11 months ago
- Windows Exploit Suggester - Next Generation☆4,365Updated this week
- offsec batteries included☆1,549Updated last year
- Writeups for HacktheBox 'boot2root' machines☆1,948Updated last year
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,151Updated 2 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,048Updated last year
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,268Updated last year
- A swiss army knife for pentesting networks☆8,643Updated last year
- A curated list of awesome privilege escalation☆1,307Updated 9 months ago
- Red Teaming Tactics and Techniques☆4,208Updated 7 months ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,375Updated 2 years ago
- CeWL is a Custom Word List Generator☆2,163Updated 5 months ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,462Updated this week