SUID3NUM
GTFONow
SUID3NUM | GTFONow | |
---|---|---|
2 | 1 | |
577 | 494 | |
- | - | |
0.0 | 6.4 | |
over 2 years ago | 6 days ago | |
Python | Python | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
SUID3NUM
GTFONow
-
Traitor: Linux privilege escalation made easy
How do you plan to use this universally across compromised systems, if they don't have Go to compile this?
A better solution might be https://github.com/Frissi0n/GTFONow which is written in python without dependencies and supports Py2/3. I would expect this to work on more hosts.
What are some alternatives?
OSCP-BoF - This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.
Wfetch - Neofetch/pfetch, but for weather
pywerview - A (partial) Python rewriting of PowerSploit's PowerView
PEASS-ng - PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
msdat - MSDAT: Microsoft SQL Database Attacking Tool
pwncat - Fancy reverse and bind shell handler
LibreQoS - A Quality of Experience and Smart Queue Management system for ISPs. Leverage CAKE to improve network responsiveness, enforce bandwidth plans, and reduce bufferbloat.
svachal - Automate writeup for vulnerable machines.
Vulnnr - Vulnnr - Vulnerability Scanner And Mass Exploiter, created for pentesting.
PowerHub - A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
odat - ODAT: Oracle Database Attacking Tool
traitor - :arrow_up: :skull_and_crossbones: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock