traitor icon indicating copy to clipboard operation
traitor copied to clipboard

:arrow_up: :skull_and_crossbones: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock

Results 23 traitor issues
Sort by recently updated
recently updated
newest added

https://github.com/Ruia-ruia/CVE-2022-29582-Exploit this is the source. Hope it will take not much time. Thank you. Ah, sorry for the clickbait title, but you see, it works!

enhancement

I ran v0.0.14 on a fully-patched (at least as far as `apt` permits) Ubuntu 22.04LTS, and got this result: ``` ▀█▀ █▀█ ▄▀█ █ ▀█▀ █▀█ █▀█ ░█░ █▀▄ █▀█ ...

Hi, I am using the command: ./traitor --exploit kernel:CVE-2022-0847 It seem to work, but terminates with an error: [+][error] Exploit failed: invalid password (see below). In /etc/passwd: traitor4242:x:1001:1001:CVE-2021-3560,,,:/home/traitor4242:/bin/bash In /etc/shadow:...

https://lwn.net/ml/oss-security/[email protected]/ Both vulnerabilities related to netfilter

Please add support for CVE-2021-3156

Hello, I have sudo with permissive line: ```%wheel ALL=(ALL) NOPASSWD: ALL``` traitor reports false positive on all vulnerable test cases, and even pops a shell. But it can't exploit anything...

If I run this tool with the `-p` option, it reports a lot of Gtfobins vulnerabilities. However, when I tried to exploit one of them, the output was this: ```...

bug

eBPF LPE: https://github.com/chompie1337/Linux_LPE_eBPF_CVE-2021-3490

Firstly, thank you creating and maintaining `traitor`, it's excellent. I ran v0.0.8 on a fully-patched (at least as far as `apt` permits) Ubuntu 20.04LTS, and got this result: ``` $...

If/when exploits are found you're left to your own devices. It'd be really useful if there was a catalogue of advice somewhere about resolving these exploits, perhaps in this project's...