diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index 37947465..629863f4 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -24,7 +24,7 @@ jobs: - name: Test run: make test - name: Build - run: CGO_ENABLED=0 GOARCH=${{ matrix.arch }} go build -ldflags "-X github.com/liamg/traitor/version.Version=`echo '${{ github.ref }}' | awk -F'/' '{print $3}'`" -o traitor-${{ matrix.arch }} ./cmd/traitor + run: CGO_ENABLED=0 GOARCH=${{ matrix.arch }} go build -ldflags "-X github.com/liamg/traitor/internal/version.Version=`echo '${{ github.ref }}' | awk -F'/' '{print $3}'`" -o traitor-${{ matrix.arch }} ./cmd/traitor - name: Upload result uses: actions/upload-artifact@v2-preview with: diff --git a/README.md b/README.md index d704c49c..d0d2c3ba 100644 --- a/README.md +++ b/README.md @@ -4,7 +4,7 @@ Automatically exploit low-hanging fruit to pop a root shell. Linux privilege esc Traitor packages up a bunch of methods to exploit local misconfigurations and vulnerabilities (including most of [GTFOBins](https://gtfobins.github.io/)) in order to pop a root shell. -![Demo](demo.gif) +![Demo](polkit.png) It'll exploit most sudo privileges listed in GTFOBins to pop a root shell, as well as exploiting issues like a writable `docker.sock`. More routes to root will be added over time too.