• 设为首页
  • 点击收藏
  • 手机版
    手机扫一扫访问
    迪恩网络手机版
  • 关注官方公众号
    微信扫一扫关注
    迪恩网络公众号

thehappydinoa/rootOS: macOS Privilege Escalation Helper

原作者: [db:作者] 来自: 网络 收藏 邀请

开源软件名称(OpenSource Name):

thehappydinoa/rootOS

开源软件地址(OpenSource Url):

https://github.com/thehappydinoa/rootOS

开源编程语言(OpenSource Language):

Python 100.0%

开源软件介绍(OpenSource Introduction):

rootOS

Tries to use various CVEs to gain sudo or root access. All exploits have an end goal of adding ALL ALL=(ALL) NOPASSWD: ALL to /etc/sudoers allowing any user to run sudo commands.

screenshot

Run

python root.py

Exploits

Name CVE Date Link(s)
ARDAgent CVE-2008-2830 06/23/2008 https://nvd.nist.gov/vuln/detail/CVE-2008-2830
DYLD_PRINT_TO_FILE CVE-2015-3760 08/16/2015 https://nvd.nist.gov/vuln/detail/CVE-2015-3760 https://twitter.com/i0n1c/status/623727538234368000
MallocLog CVE-2015-5889 0/09/2015 https://nvd.nist.gov/vuln/detail/CVE-2015-5889
Proxifier Sanitize CVE-2017-7643 04/14/2017 https://nvd.nist.gov/vuln/detail/CVE-2017-7643
Sera Local Pass 10/31/2017 https://m4.rkw.io/blog/cve201715918-sera-12-local-root-privesc-and-password-disclosure.html
NoPass CVE-2017-13872 11/29/2017 https://nvd.nist.gov/vuln/detail/CVE-2017-13872 https://objective-see.com/blog/blog_0x24.html
KeySteal CVE-2019-8526 06/01/2019 https://github.com/LinusHenze/Keysteal
AppleScript Dynamic Phishing https://github.com/thehappydinoa/rootOS/blob/master/apps.json
Sudo Piggyback https://www.n00py.io/2016/10/privilege-escalation-on-os-x-without-exploits/

Dynamic Phishing

phishing

Please note the dynamic icon and prompt

Additional Exploits

License

MIT




鲜花

握手

雷人

路过

鸡蛋
该文章已有0人参与评论

请发表评论

全部评论

专题导读
热门推荐
阅读排行榜

扫描微信二维码

查看手机版网站

随时了解更新最新资讯

139-2527-9053

在线客服(服务时间 9:00~18:00)

在线QQ客服
地址:深圳市南山区西丽大学城创智工业园
电邮:jeky_zhao#qq.com
移动电话:139-2527-9053

Powered by 互联科技 X3.4© 2001-2213 极客世界.|Sitemap