SUDO_KILLER

Sudo Exploiter

A tool to exploit vulnerabilities in the sudo program on Unix-like systems

A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.

GitHub

2k stars
50 watching
255 forks
Language: Shell
last commit: 5 months ago
Linked from 1 awesome list

abuse-sudoctfcveexploitslinux-exploitsmisconfigurationoscposcp-journeyoscp-preposcp-toolspentestpentest-toolprivilege-escalationsudosudo-exploitation

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
scumjr/dirtycow-vdso A Proof-of-Concept for exploiting a vulnerability in the Linux vDSO, allowing arbitrary code execution. 491
s0lst1c3/eaphammer A toolkit for exploiting weaknesses in WPA2-Enterprise networks to gain unauthorized access to credentials 2,194
twelvesec/rootend A tool designed to automate the discovery and exploitation of security vulnerabilities in Unix systems. 146
reider-roque/linpostexp Tools for analyzing and exploiting vulnerabilities in Linux systems 176
bishopfox/badpods A collection of Kubernetes pod manifests demonstrating the impact of elevated privileges on security and functionality. 599
c0r0n3r/dheater An implementation of a proof-of-concept attack exploiting a vulnerability in Diffie-Hellman key exchange for denial-of-service 186
mainframed/tshocker An FTP-based tool to execute malicious commands on a mainframe system using a CATSO/JCL wrapper 24
cyb3rmx/qu1cksc0pe A comprehensive tool for analyzing suspicious files and detecting malware characteristics. 1,320
mssabr01/sixnet-tools A tool that exploits vulnerabilities in Sixnet RTUs to gain root-level access 16
xawdxawdx/sentryssrf A tool to search for and exploit Sentry configuration vulnerabilities in web applications 67
adon90/pentest_compilation A collection of compiled scripts and resources for testing and exploiting vulnerabilities in various systems and applications 1,327
matterpreter/offensivecsharp A collection of C# tooling and POCs for operating system exploitation and vulnerability assessment. 1,381
r3dxpl0it/cve-2018-4407 Exploits a heap buffer overflow vulnerability in the XNU operating system kernel to cause a denial-of-service attack on iOS and macOS devices. 35
1n3/sn1per Automates vulnerability scanning and discovery across an organization's entire attack surface 8,140
redsection/offensiveph A tool that utilizes an old driver to bypass user-mode access controls and inject malicious code into processes 329