OSCP-BoF VS SUDO_KILLER

Compare OSCP-BoF vs SUDO_KILLER and see what are their differences.

OSCP-BoF

This is a walkthrough about understanding the #BoF machine present in the #OSCP exam. (by 3isenHeiM)

SUDO_KILLER

A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user. (by TH3xACE)
Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
OSCP-BoF SUDO_KILLER
2 8
64 2,096
- -
0.0 8.8
almost 3 years ago about 2 months ago
Python Shell
GNU General Public License v3.0 only MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

OSCP-BoF

Posts with mentions or reviews of OSCP-BoF. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-06-03.

SUDO_KILLER

Posts with mentions or reviews of SUDO_KILLER. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-01-26.

What are some alternatives?

When comparing OSCP-BoF and SUDO_KILLER you can also consider the following projects:

dostackbufferoverflowgood

OSCP-Exam-Report-Template - Modified template for the OSCP Exam and Labs. Used during my passing attempt

SUID3NUM - A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binaries, cross-match those with bins in GTFO Bin's repository & auto-exploit those, all with colors! ( ͡~ ͜ʖ ͡°)

linux-smart-enumeration - Linux enumeration tool for pentesting and CTFs with verbosity levels

zenith - Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.

EZEA - EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces

raptor_infiltrate20 - #INFILTRATE20 raptor's party pack.

linux-exploit-suggester - Linux privilege escalation auditing tool

TireFire - Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortable GUI-ish platform. Great for OSCP/HTB type Machines as well as penetration testing.

CTF-Difficulty - This cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.

try-harder - "Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Security Certified Professional (OSCP) exam, all while offering an immersive experience and retro aesthetic. Enter Real commands correctly, move to the next host, and get a point. Can you get 100?

CVE-2021-4034 - PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)