From 3015539be58f7b7b3562809a45c8c87d6f960d9b Mon Sep 17 00:00:00 2001 From: Victor Ramos Mello <772792+m0nad@users.noreply.github.com> Date: Fri, 12 Mar 2021 23:16:12 +0100 Subject: [PATCH] Add traitor to linux tools --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 6ac272d..b145a22 100644 --- a/README.md +++ b/README.md @@ -93,6 +93,7 @@ is intended to be executed locally on a Linux box to enumerate basic system info - [linux-soft-exploit-suggester](https://github.com/belane/linux-soft-exploit-suggester): linux-soft-exploit-suggester finds exploits for all vulnerable software in a system helping with the privilege escalation. - [PrivEsc](https://github.com/1N3/PrivEsc): A collection of Windows, Linux and MySQL privilege escalation scripts and exploits. - [pspy](https://github.com/DominicBreuker/pspy): unprivileged Linux process snooping + - [traitor](https://github.com/liamg/traitor): Automatically exploit low-hanging fruit to pop a root shell. Linux privilege escalation made easy! - [unix-privesc-check](https://github.com/pentestmonkey/unix-privesc-check): Shell script to check for simple privilege escalation vectors on Unix systems - [Unix-Privilege-Escalation-Exploits-Pack](https://github.com/Kabot/Unix-Privilege-Escalation-Exploits-Pack): Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc. - [uptux](https://github.com/initstring/uptux): Specialized privilege escalation checks for Linux systems.