SUDO_KILLER
Sudo Exploiter
A tool to exploit vulnerabilities in the sudo program on Unix-like systems
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
2k stars
50 watching
255 forks
Language: Shell
last commit: 8 months ago
Linked from 1 awesome list
abuse-sudoctfcveexploitslinux-exploitsmisconfigurationoscposcp-journeyoscp-preposcp-toolspentestpentest-toolprivilege-escalationsudosudo-exploitation
Related projects:
Repository | Description | Stars |
---|---|---|
| A Proof-of-Concept for exploiting a vulnerability in the Linux vDSO, allowing arbitrary code execution. | 492 |
| A toolkit for exploiting weaknesses in WPA2-Enterprise networks to gain unauthorized access to credentials | 2,213 |
| A tool designed to automate the discovery and exploitation of security vulnerabilities in Unix systems. | 147 |
| Tools for analyzing and exploiting vulnerabilities in Linux systems | 176 |
| A collection of Kubernetes pod manifests demonstrating the impact of elevated privileges on security and functionality. | 603 |
| An implementation of a proof-of-concept attack exploiting a vulnerability in Diffie-Hellman key exchange for denial-of-service | 187 |
| An FTP-based tool to execute malicious commands on a mainframe system using a CATSO/JCL wrapper | 24 |
| An all-in-one malware analysis tool that provides detailed information about suspicious files and executables. | 1,348 |
| A tool that exploits vulnerabilities in Sixnet RTUs to gain root-level access | 16 |
| A tool to search for and exploit Sentry configuration vulnerabilities in web applications | 68 |
| A collection of compiled scripts and resources for testing and exploiting vulnerabilities in various systems and applications | 1,327 |
| A collection of C# tooling and POCs for operating system exploitation and vulnerability assessment. | 1,383 |
| Exploits a heap buffer overflow vulnerability in the XNU operating system kernel to cause a denial-of-service attack on iOS and macOS devices. | 35 |
| An attack surface management platform that automates the discovery of hidden assets and vulnerabilities in computer environments. | 8,190 |
| A tool that utilizes an old driver to bypass user-mode access controls and inject malicious code into processes | 329 |