Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality. Learn more →
SUDO_KILLER Alternatives
Similar projects and alternatives to SUDO_KILLER
-
OSCP-Exam-Report-Template
Modified template for the OSCP Exam and Labs. Used during my passing attempt
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
linux-smart-enumeration
Linux enumeration tool for pentesting and CTFs with verbosity levels
-
EZEA
EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces
-
linux-exploit-suggester
Linux privilege escalation auditing tool
-
CTF-Difficulty
This cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.
-
OSCP-BoF
This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
CVE-2021-4034
PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034) (by arthepsy)
-
zsh-toggle-command-prefix
Zsh widget to toggle a prefix on a command
-
SUDO_KILLER reviews and mentions
- cve-2023-22809
-
CVE-2023-22809
this project https://github.com/TH3xACE/SUDO_KILLER can be used to detect and exploit this CVE.
-
Sudoedit can edit arbitrary files (CVE-2023-22809)
check the project https://github.com/TH3xACE/SUDO_KILLER ... there is a docker and the tool within it to play with the described scenario and there is a video also...showing the exploitation :)
- TH3xACE/SUDO_KILLER - A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
- Some of the latest CVEs like CVE-2014-0106, CVE-2015-5602, CVE-2017-1000367, CVE-2019-14287, CVE-2019-18634, CVE-2021-3156 and CVE-2021-23240 are detected by the tool and much more. If you like the project, don't forget to give a +1 star on github. Thanks
- How to detect sudo’s CVE-2021-3156 using Falco
-
Baron Samedit: Heap-based buffer overflow in Sudo (CVE-2021-3156)
Detection and checks for CVE-2021-3156 and CVE-2021-23240 were added to https://github.com/TH3xACE/SUDO_KILLER . Please give a +1 star on github if you appreciate the project.
-
A note from our sponsor - InfluxDB
www.influxdata.com | 18 Apr 2024
Stats
TH3xACE/SUDO_KILLER is an open source project licensed under MIT License which is an OSI approved license.
The primary programming language of SUDO_KILLER is Shell.
Popular Comparisons
- SUDO_KILLER VS OSCP-Exam-Report-Template
- SUDO_KILLER VS linux-smart-enumeration
- SUDO_KILLER VS EZEA
- SUDO_KILLER VS linux-exploit-suggester
- SUDO_KILLER VS CTF-Difficulty
- SUDO_KILLER VS OSCP-BoF
- SUDO_KILLER VS CVE-2021-4034
- SUDO_KILLER VS zsh-toggle-command-prefix
- SUDO_KILLER VS awesome-oscp
- SUDO_KILLER VS please