Linux enumeration tool for pentesting and CTFs with verbosity levels
-
Updated
Dec 25, 2023 - Shell
Linux enumeration tool for pentesting and CTFs with verbosity levels
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
Bash script purposed for system enumeration, vulnerability identification and privilege escalation.
Linux Privilege Escalation Tool By WazeHell
Local Privilege Escalation
Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container
Suggests programs to run against services found during the enumeration phase of a Pentest
Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container
Hacking Methodology, Cheatsheats, Conceptual-Breakdowns
CVE-2021-3560 Local PrivEsc Exploit
Privilege escalation in Docker
🔥Ready, Aim, Fire.🔥
Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured systems.
A Tool which can exploit 137 files from GTFO-Bins automaticlly
CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion
Scripted Local Linux Enumeration & Privilege Escalation Checks
Modular Privesc ToolBox Add or Remove Tools as you want just with 4 lines and 6 lines for making it looks good ;)
This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObins
Add a description, image, and links to the privilege-escalation topic page so that developers can more easily learn about it.
To associate your repository with the privilege-escalation topic, visit your repo's landing page and select "manage topics."