please VS SUDO_KILLER

Compare please vs SUDO_KILLER and see what are their differences.

please

Really tiny sudo replacement (by gblach)

SUDO_KILLER

A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user. (by TH3xACE)
Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
please SUDO_KILLER
1 8
12 2,096
- -
3.7 8.8
11 months ago about 2 months ago
C Shell
BSD 2-clause "Simplified" License MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

please

Posts with mentions or reviews of please. We have used some of these posts to build our list of alternatives and similar projects.

SUDO_KILLER

Posts with mentions or reviews of SUDO_KILLER. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-01-26.

What are some alternatives?

When comparing please and SUDO_KILLER you can also consider the following projects:

gsudo - Sudo for Windows

OSCP-Exam-Report-Template - Modified template for the OSCP Exam and Labs. Used during my passing attempt

suda.vim - 🥪 An alternative sudo.vim for Vim and Neovim, limited support sudo in Windows

linux-smart-enumeration - Linux enumeration tool for pentesting and CTFs with verbosity levels

sudo_pair - Plugin for sudo that requires another human to approve and monitor privileged sudo sessions

EZEA - EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces

pam_reattach - Reattach to the user's GUI session on macOS during authentication (for Touch ID support in tmux)

linux-exploit-suggester - Linux privilege escalation auditing tool

CTF-Difficulty - This cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.

CVE-2021-4034 - PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)

OSCP-BoF - This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.

zsh-toggle-command-prefix - Zsh widget to toggle a prefix on a command