nongiach / sudo_inject
[Linux] Two Privilege Escalation techniques abusing sudo token
☆711Updated 6 years ago
Alternatives and similar repositories for sudo_inject:
Users that are interested in sudo_inject are comparing it to the libraries listed below
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆670Updated 5 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆561Updated 11 months ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆976Updated 7 years ago
- ☆1,145Updated 7 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆574Updated 10 months ago
- Linux PAM Backdoor☆327Updated last year
- Herramienta para evadir disable_functions y open_basedir☆418Updated last year
- Some of my exploits.☆579Updated 4 years ago
- Tool for extracting information from newly spawned processes☆752Updated 3 years ago
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆381Updated 2 years ago
- Linux post exploitation privilege escalation enumeration☆256Updated 4 years ago
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆538Updated 2 years ago
- Search gtfobins and lolbas files from your terminal☆459Updated 2 years ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆999Updated 3 years ago
- Bash post exploitation toolkit☆730Updated last year
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆621Updated 3 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆694Updated 4 years ago
- A handy collection of my public exploits, all in one place.☆606Updated last month
- Various local exploits☆140Updated 2 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆887Updated 4 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,588Updated 4 years ago
- Various kernel exploits☆772Updated last year
- Automatic exploit generation for simple linux pwn challenges.☆321Updated last year
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆573Updated 10 years ago
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,505Updated last year
- Shellshock exploit + vulnerable environment☆210Updated last year
- kadimus is a tool to check and exploit lfi vulnerability.☆532Updated 4 years ago
- Python PTY backdoors - full PTY or nothing!☆743Updated 10 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆289Updated 5 years ago
- kernel privilege escalation enumeration and exploitation framework☆690Updated 6 years ago