nongiach / sudo_inject
[Linux] Two Privilege Escalation techniques abusing sudo token
☆701Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for sudo_inject
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆662Updated 5 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆958Updated 6 years ago
- Some of my exploits.☆572Updated 3 years ago
- Herramienta para evadir disable_functions y open_basedir☆396Updated last year
- ☆1,114Updated 7 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆555Updated 6 months ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆687Updated 4 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆288Updated 5 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆568Updated 5 months ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆612Updated 3 years ago
- Linux post exploitation privilege escalation enumeration☆253Updated 4 years ago
- Tool for extracting information from newly spawned processes☆735Updated 2 years ago
- A handy collection of my public exploits, all in one place.☆597Updated 10 months ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆976Updated 3 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆513Updated 3 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,556Updated 3 years ago
- Python PTY backdoors - full PTY or nothing!☆740Updated 10 years ago
- Linux PAM Backdoor☆314Updated last year
- Next-Generation Linux Kernel Exploit Suggester☆1,858Updated last year
- kernel privilege escalation enumeration and exploitation framework☆687Updated 6 years ago
- Various kernel exploits☆746Updated 8 months ago
- A DNS rebinding attack framework.☆1,036Updated 5 months ago
- Steal Net-NTLM Hash using Bad-PDF☆1,072Updated 4 years ago
- pwning IPv4 via IPv6☆1,712Updated 9 months ago
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆520Updated 2 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆807Updated last year
- Bash post exploitation toolkit☆719Updated last year
- Automatic exploit generation for simple linux pwn challenges.☆317Updated last year
- kadimus is a tool to check and exploit lfi vulnerability.☆514Updated 4 years ago
- Simple php reverse shell implemented using binary .☆400Updated last year