Rootend is a python *nix Enumerator & Auto Privilege Escalation tool.
For a full list of our tools, please visit our website https://www.twelvesec.com/
Written by:
._
_ /_ _ | | _ / / _
| | \ \/ \/ // | |\ \/ // _ \ _____ _/ _ _/ \ | | \ /\ /| |\ /\ / / \ /\ ___
|| \/_/ __ >/_/ __ > /__ >___ >
\/ \/ \/ \/ \/
rootend v.2.0.2 – Enumeration & Automation Privilege Escalation tool.
rootend is an open source tool licensed under GPLv3.
Affected systems: *nix.
Written by: @nickvourd of @twelvesec.
Special thanks to @maldevel & servo.
https://www.twelvesec.com/
Please visit https://github.com/twelvesec/rootend for more..
optional arguments:
-h, –help show this help message and exit
-v, –version show version and exit
-a, –auto automated privilege escalation process
-m, –manual system enumeration
-n, –nocolor disable color
-b, –banner show banner and exit
-s, –suid suid binary enumeration
-w, –weak weak permissions of files enumeration
-p, –php PHP configuration files enumeration
-c, –capabilities capabilities enumeration
-f, –full-writables world writable files enumeration
usage examples:
./rootend.py -a
./rootend.py -m
./rootend.py -v
./rootend.py -b
Specific categories usage examples:
./rootend.py -a -s
./rootend.py -m -w
./rootend.py -a -s -p
./rootend.py -m -w -c -p
./rootend.py -a -s -c -p -f
*Use the above arguments with -n to disable color.
Version
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…
"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…
CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…