Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463
-
Updated
Nov 19, 2025 - Shell
Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463
A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualization techniques. Built to operate both as a standalone PowerShell script and as a compiled executable (.exe) for maximum flexibility and stealth.
pSlip is an Android static analysis tool kit designed to find potentially vulnerable escalation paths by analyzing exported components, intent filters, provider permissions and cryptographic misuse.
A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualization techniques. Built to operate both as a standalone PowerShell script and as a compiled executable (.exe) for maximum flexibility and stealth.
Authentication gateway / Dynamic SSH key manager / Privileged access management tool for Linux.
CVE-2025-4138 / CVE-2025-4517 — Python tarfile PATH_MAX Symlink Filter Bypass
This repository provides easy-to-follow methods for gaining admin rights (privilege escalation) on Windows 10, 11, and newer systems. Learn how to identify and exploit misconfigurations, weak permissions, and common security flaws to escalate user privileges. Perfect for ethical hackers, penetration testers, and security researchers looking to test
🔒 Exploit local privilege escalation vulnerabilities in sudo before 1.9.17p1 using the chroot option for enhanced security assessments.
Hello friend. This is the key to the kingdom. Advanced LPE exploit for CheckMK (CVE-2024-0670). Abuses insecure file handling for SYSTEM access. Includes surgical persistence module. Written in C++. They thought they were safe. They were wrong. The 5/9 revolution starts with a root shell. > We Are Fsociety_
🔍 Demonstrate the CVE-2025-32463 privilege-escalation flaw in sudo's chroot feature with this minimal, reproducible proof of concept environment.
This module makes it easy to check system platform type and gain admin rights for scripts that require it.
Local Privilege Escalation (LPE) vulnerability in Polkit - Pwnkit
Remote administrative tool for windows
AmusePermit: IPC framework for unifying permissions for Android sensitive APIs
🔍 Exploit CVE-2024-0670 in CheckMK agents for local privilege escalation using a robust C++ tool designed for security professionals.
How to get root privileges if you may run docker containers
Add a description, image, and links to the escalate-privilages topic page so that developers can more easily learn about it.
To associate your repository with the escalate-privilages topic, visit your repo's landing page and select "manage topics."