Rootend is a python *nix Enumerator & Auto Privilege Escalation tool.
For a full list of our tools, please visit our website https://www.twelvesec.com/
Written by:
._
_ /_ _ | | _ / / _
| | \ \/ \/ // | |\ \/ // _ \ _____ _/ _ _/ \ | | \ /\ /| |\ /\ / / \ /\ ___
|| \/_/ __ >/_/ __ > /__ >___ >
\/ \/ \/ \/ \/
rootend v.2.0.2 – Enumeration & Automation Privilege Escalation tool.
rootend is an open source tool licensed under GPLv3.
Affected systems: *nix.
Written by: @nickvourd of @twelvesec.
Special thanks to @maldevel & servo.
https://www.twelvesec.com/
Please visit https://github.com/twelvesec/rootend for more..
optional arguments:
-h, –help show this help message and exit
-v, –version show version and exit
-a, –auto automated privilege escalation process
-m, –manual system enumeration
-n, –nocolor disable color
-b, –banner show banner and exit
-s, –suid suid binary enumeration
-w, –weak weak permissions of files enumeration
-p, –php PHP configuration files enumeration
-c, –capabilities capabilities enumeration
-f, –full-writables world writable files enumeration
usage examples:
./rootend.py -a
./rootend.py -m
./rootend.py -v
./rootend.py -b
Specific categories usage examples:
./rootend.py -a -s
./rootend.py -m -w
./rootend.py -a -s -p
./rootend.py -m -w -c -p
./rootend.py -a -s -c -p -f
*Use the above arguments with -n to disable color.
Version
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…