 SUDO_KILLER
 SUDO_KILLER 
 Sudo Exploiter
 A tool to exploit vulnerabilities in the sudo program on Unix-like systems
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
2k stars
 50 watching
 255 forks
 
Language: Shell 
last commit: over 1 year ago 
Linked from   1 awesome list  
  abuse-sudoctfcveexploitslinux-exploitsmisconfigurationoscposcp-journeyoscp-preposcp-toolspentestpentest-toolprivilege-escalationsudosudo-exploitation 
 Related projects:
| Repository | Description | Stars | 
|---|---|---|
|  | A Proof-of-Concept for exploiting a vulnerability in the Linux vDSO, allowing arbitrary code execution. | 492 | 
|  | A toolkit for exploiting weaknesses in WPA2-Enterprise networks to gain unauthorized access to credentials | 2,213 | 
|  | A tool designed to automate the discovery and exploitation of security vulnerabilities in Unix systems. | 147 | 
|  | Tools for analyzing and exploiting vulnerabilities in Linux systems | 176 | 
|  | A collection of Kubernetes pod manifests demonstrating the impact of elevated privileges on security and functionality. | 603 | 
|  | An implementation of a proof-of-concept attack exploiting a vulnerability in Diffie-Hellman key exchange for denial-of-service | 187 | 
|  | An FTP-based tool to execute malicious commands on a mainframe system using a CATSO/JCL wrapper | 24 | 
|  | An all-in-one malware analysis tool that provides detailed information about suspicious files and executables. | 1,348 | 
|  | A tool that exploits vulnerabilities in Sixnet RTUs to gain root-level access | 16 | 
|  | A tool to search for and exploit Sentry configuration vulnerabilities in web applications | 68 | 
|  | A collection of compiled scripts and resources for testing and exploiting vulnerabilities in various systems and applications | 1,327 | 
|  | A collection of C# tooling and POCs for operating system exploitation and vulnerability assessment. | 1,383 | 
|  | Exploits a heap buffer overflow vulnerability in the XNU operating system kernel to cause a denial-of-service attack on iOS and macOS devices. | 35 | 
|  | An attack surface management platform that automates the discovery of hidden assets and vulnerabilities in computer environments. | 8,190 | 
|  | A tool that utilizes an old driver to bypass user-mode access controls and inject malicious code into processes | 329 |