TH3xACE / SUDO_KILLERLinks
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
☆2,408Updated 2 months ago
Alternatives and similar repositories for SUDO_KILLER
Users that are interested in SUDO_KILLER are comparing it to the libraries listed below
Sorting:
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,907Updated 3 years ago
- Windows / Linux Local Privilege Escalation Workshop☆2,029Updated 3 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,803Updated 2 years ago
- A curated list of awesome privilege escalation☆1,485Updated 4 months ago
- A script that you can run in the background!☆2,933Updated last year
- Red Teaming & Pentesting checklists for various engagements☆2,626Updated 4 months ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,591Updated last year
- Writeups for HacktheBox 'boot2root' machines☆2,004Updated 2 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,755Updated 3 years ago
- The ultimate WinRM shell for hacking/pentesting☆5,171Updated last week
- Automation for internal Windows Penetrationtest / AD-Security☆3,618Updated 3 months ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,489Updated last week
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,514Updated 2 years ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,348Updated 8 months ago
- Next-Generation Linux Kernel Exploit Suggester☆1,949Updated 2 years ago
- Monitor linux processes without root permissions☆5,807Updated 2 years ago
- CeWL is a Custom Word List Generator☆2,515Updated 2 months ago
- Fancy reverse and bind shell handler☆2,858Updated last year
- A tool to perform Kerberos pre-auth bruteforcing☆3,167Updated last year
- Red Teaming Tactics and Techniques☆4,456Updated last year
- offsec batteries included☆1,579Updated last year
- JAWS - Just Another Windows (Enum) Script☆1,900Updated 4 years ago
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆2,564Updated 5 years ago
- ☆2,350Updated 2 years ago
- Notes about attacking Jenkins servers☆2,087Updated last year
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,179Updated 3 years ago
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010☆1,334Updated 2 years ago
- Windows Exploit Suggester - Next Generation☆4,720Updated this week
- pwning IPv4 via IPv6☆1,866Updated last year
- Reverse shell generator written in Python 3.☆544Updated 4 months ago