nongiach / sudo_injectLinks
[Linux] Two Privilege Escalation techniques abusing sudo token
☆718Updated 6 years ago
Alternatives and similar repositories for sudo_inject
Users that are interested in sudo_inject are comparing it to the libraries listed below
Sorting:
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆678Updated 6 years ago
- Some of my exploits.☆590Updated 4 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆566Updated last year
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆381Updated 2 years ago
- ☆1,167Updated 8 years ago
- A handy collection of my public exploits, all in one place.☆669Updated 3 months ago
- Herramienta para evadir disable_functions y open_basedir☆450Updated 2 years ago
- Tool for extracting information from newly spawned processes☆763Updated 4 months ago
- kernel privilege escalation enumeration and exploitation framework☆698Updated 7 years ago
- Python PTY backdoors - full PTY or nothing!☆750Updated 11 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆979Updated 7 years ago
- Search gtfobins and lolbas files from your terminal☆462Updated 3 years ago
- Bash post exploitation toolkit☆741Updated 2 years ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,022Updated 4 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆698Updated 5 years ago
- Debian OpenSSL Predictable PRNG (CVE-2008-0166)☆401Updated 2 years ago
- Automated script for performing Padding Oracle attacks☆791Updated last year
- Various kernel exploits☆793Updated last year
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆817Updated 2 years ago
- Linux PAM Backdoor☆348Updated last year
- GTRS - Google Translator Reverse Shell☆618Updated 11 months ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆290Updated 5 years ago
- PoC exploits for software vulnerabilities☆682Updated 4 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆579Updated last year
- Shellshock exploit + vulnerable environment☆218Updated 2 years ago
- Linux post exploitation privilege escalation enumeration☆259Updated 5 years ago
- Smart Install Exploitation Tool☆583Updated 3 years ago
- A DNS rebinding attack framework.☆1,183Updated 2 months ago
- Default usernames and passwords for various systems (VoIP,IPMI,Oracle).☆434Updated last year
- Linux 4.10 < 5.1.17 PTRACE_TRACEME local root☆330Updated 6 years ago