⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
-
Updated
Mar 12, 2024 - Go
⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
Monitor linux processes without root permissions
Get GTFOBins info about a given exploit from the command line
A client-server-dropper arch RAT against windows machines (WIP!)
Add a description, image, and links to the privesc topic page so that developers can more easily learn about it.
To associate your repository with the privesc topic, visit your repo's landing page and select "manage topics."