traitor
GTFONow
traitor | GTFONow | |
---|---|---|
17 | 1 | |
6,497 | 494 | |
- | - | |
0.0 | 6.4 | |
about 2 months ago | 8 days ago | |
Go | Python | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
traitor
- Traitor – Automatic Linux privesc via exploitation of low-hanging fruits
-
Exploiting
How about traitor?
- Traitor now includes an exploit for CVE-2021-4034 (pwnkit)
- Traitor: Escalada de Privilegios Automático en Linux 🤠
- Traitor: Linux privilege escalation made easy
- Traitor: Automatic Linux privilege escalation via exploitation of low-hanging fruit
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins
GTFONow
-
Traitor: Linux privilege escalation made easy
How do you plan to use this universally across compromised systems, if they don't have Go to compile this?
A better solution might be https://github.com/Frissi0n/GTFONow which is written in python without dependencies and supports Py2/3. I would expect this to work on more hosts.
What are some alternatives?
PEASS-ng - PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Wfetch - Neofetch/pfetch, but for weather
pspy - Monitor linux processes without root permissions
kubesploit - Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
pwncat - Fancy reverse and bind shell handler
jaeles - The Swiss Army knife for automated Web Application Testing
SUID3NUM - A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binaries, cross-match those with bins in GTFO Bin's repository & auto-exploit those, all with colors! ( ͡~ ͜ʖ ͡°)
cve-2021-3449 - CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻
svachal - Automate writeup for vulnerable machines.
Cameradar - Cameradar hacks its way into RTSP videosurveillance cameras
PowerHub - A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting