please
SUDO_KILLER
please | SUDO_KILLER | |
---|---|---|
22 | 8 | |
- | 2,096 | |
- | - | |
- | 8.8 | |
- | about 2 months ago | |
Shell | ||
- | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
please
- Please, sudo like program with regex support written in Rust
- Sudo: Heap-based overflow with small passwords
-
alias f*cking="sudo"
Someone already wrote a sudo clone in Rust and named it please: https://gitlab.com/edneville/please
- Be nice to your terminal.
-
I have no idea if this has been posted already
Or please, like sudo, but not. Especially if you want something like nice cookies, you should always say "please".
-
I did a thing.
please :)
-
Work fraud
Hey nice user name :) Looks like you're familiar with sudo, it is a bit self-promotional but I wrote an alternative to sudo that's now in some distros. It is over at please. Written in rust to avoid traditional c flaws. If you know regex, you'll probably like this.
-
I will be setting sudo to OwO
I just use please, https://gitlab.com/edneville/please No need for an alias.
-
A skin cream that obeys
Saw your flair, pleaseedit.
-
My new setup - Guys why isn't it working??
Self promotion warning, I've been working on a sudo clone called please. Written in rust to avoid traditional c flaws. I suggest trying it out to get more diversity in the ecosystem. Or not, totally up to you.
SUDO_KILLER
- cve-2023-22809
-
CVE-2023-22809
this project https://github.com/TH3xACE/SUDO_KILLER can be used to detect and exploit this CVE.
-
Sudoedit can edit arbitrary files (CVE-2023-22809)
check the project https://github.com/TH3xACE/SUDO_KILLER ... there is a docker and the tool within it to play with the described scenario and there is a video also...showing the exploitation :)
- TH3xACE/SUDO_KILLER - A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
- Some of the latest CVEs like CVE-2014-0106, CVE-2015-5602, CVE-2017-1000367, CVE-2019-14287, CVE-2019-18634, CVE-2021-3156 and CVE-2021-23240 are detected by the tool and much more. If you like the project, don't forget to give a +1 star on github. Thanks
- How to detect sudo’s CVE-2021-3156 using Falco
-
Baron Samedit: Heap-based buffer overflow in Sudo (CVE-2021-3156)
Detection and checks for CVE-2021-3156 and CVE-2021-23240 were added to https://github.com/TH3xACE/SUDO_KILLER . Please give a +1 star on github if you appreciate the project.
What are some alternatives?
rdpwrap - RDP Wrapper Library
OSCP-Exam-Report-Template - Modified template for the OSCP Exam and Labs. Used during my passing attempt
doas - A port of OpenBSD's doas which runs on FreeBSD, Linux, NetBSD, and illumos
linux-smart-enumeration - Linux enumeration tool for pentesting and CTFs with verbosity levels
rudo - A toy sudo clone written in Rust
EZEA - EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces
sudo - Utility to execute a command as another user
linux-exploit-suggester - Linux privilege escalation auditing tool
nosystemd.org - Website for arguments against systemd and further resources
CTF-Difficulty - This cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.
pac - Do you wanna Arch BTW but can't remember those pesky pacman commands ? Behold pac ! a simplified frontend to pacman.
CVE-2021-4034 - PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)