nongiach / sudo_inject
[Linux] Two Privilege Escalation techniques abusing sudo token
☆714Updated 6 years ago
Alternatives and similar repositories for sudo_inject
Users that are interested in sudo_inject are comparing it to the libraries listed below
Sorting:
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆669Updated 6 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆561Updated last year
- ☆1,151Updated 8 years ago
- Herramienta para evadir disable_functions y open_basedir☆427Updated last year
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆976Updated 7 years ago
- Some of my exploits.☆581Updated 4 years ago
- A handy collection of my public exploits, all in one place.☆607Updated 3 weeks ago
- Search gtfobins and lolbas files from your terminal☆459Updated 2 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆289Updated 5 years ago
- Tool for extracting information from newly spawned processes☆755Updated 3 years ago
- Bash post exploitation toolkit☆731Updated last year
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆622Updated 3 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆534Updated 4 years ago
- Python PTY backdoors - full PTY or nothing!☆744Updated 10 years ago
- fireELF - Fileless Linux Malware Framework☆668Updated 6 years ago
- PoC for CVE-2021-3156 (sudo heap overflow)☆435Updated 3 years ago
- socks4 reverse proxy for penetration testing☆594Updated 6 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆812Updated 2 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆695Updated 4 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆575Updated 10 months ago
- Linux PAM Backdoor☆328Updated last year
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,000Updated 3 years ago
- Linux post exploitation privilege escalation enumeration☆256Updated 4 years ago
- Various kernel exploits☆774Updated last year
- Simple php reverse shell implemented using binary .☆413Updated last year
- A DNS rebinding attack framework.☆1,098Updated last week
- ☆688Updated 5 months ago
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,068Updated 3 years ago
- Shellshock exploit + vulnerable environment☆212Updated 2 years ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆720Updated last year