Sudo_killer Alternatives

A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
Suggest Alternative
Alternatives To TH3xACE/SUDO_KILLER
Project Name Stars Downloads Repos Using This Packages Using This Most Recent Commit Total Releases Latest Release Open Issues License Language
vitalysim/Awesome-Hacking-Resources 14,192 0 0 over 2 years ago 0 16 gpl-3.0
A collection of hacking / penetration testing resources to make you better!
liamg/traitor 6,329 0 0 over 2 years ago 19 March 09, 2022 17 mit Go
:arrow_up: :skull_and_crossbones: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
k8gege/K8tools 5,502 0 0 over 2 years ago 0 6 mit PowerShell
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
xairy/linux-kernel-exploitation 5,116 0 0 over 2 years ago 0 0 cc-by-4.0
A collection of links related to Linux kernel security and exploitation
S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet 4,672 0 0 over 2 years ago 0 4 mit
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
coreb1t/awesome-pentest-cheat-sheets 3,617 0 0 over 2 years ago 0 2
Collection of the cheat sheets useful for pentesting
cdk-team/CDK 3,267 0 0 over 2 years ago 35 March 12, 2023 14 apache-2.0 Go
📦 Make security testing of K8s, Docker, and Containerd easier.
S3cur3Th1sSh1t/WinPwn 3,073 0 0 over 2 years ago 0 2 bsd-3-clause PowerShell
Automation for internal Windows Penetrationtest / AD-Security
TH3xACE/SUDO_KILLER 2,032 0 0 about 2 years ago 0 0 mit Shell
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
ihebski/A-Red-Teamer-diaries 1,294 0 0 over 2 years ago 0 0
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Alternatives To TH3xACE/SUDO_KILLER
Select To Compare


Alternative Project Comparisons
Popular Privilege Escalation Projects
Popular Exploitation Projects
Popular Security Categories
Related Searches
Get A Weekly Email With Trending Projects
No Spam. Unsubscribe easily at any time.
Privacy | About | Terms | Follow Us On Twitter

Downloads, Dependent Repos, Dependent Packages, Total Releases, Latest Releases data powered by Libraries.io.

Copyright 2018-2026 Awesome Open Source.  All rights reserved.