{"id":13510672,"url":"https://github.com/sleventyeleven/linuxprivchecker","last_synced_at":"2025-05-15T08:04:53.575Z","repository":{"id":40763391,"uuid":"56599386","full_name":"sleventyeleven/linuxprivchecker","owner":"sleventyeleven","description":"linuxprivchecker.py -- a Linux Privilege Escalation Check Script","archived":false,"fork":false,"pushed_at":"2022-01-31T10:32:08.000Z","size":46,"stargazers_count":1641,"open_issues_count":0,"forks_count":523,"subscribers_count":43,"default_branch":"master","last_synced_at":"2025-04-14T13:07:54.112Z","etag":null,"topics":["ctf-tools","hackthebox","htb","linux-privilege-escalation","linux-security","oscp","oscp-tools","pentest-tools","pentesting","security"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":false,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/sleventyeleven.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2016-04-19T13:31:46.000Z","updated_at":"2025-04-14T06:35:20.000Z","dependencies_parsed_at":"2022-07-12T18:03:26.871Z","dependency_job_id":null,"html_url":"https://github.com/sleventyeleven/linuxprivchecker","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/sleventyeleven%2Flinuxprivchecker","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/sleventyeleven%2Flinuxprivchecker/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/sleventyeleven%2Flinuxprivchecker/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/sleventyeleven%2Flinuxprivchecker/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/sleventyeleven","download_url":"https://codeload.github.com/sleventyeleven/linuxprivchecker/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":254301422,"owners_count":22047901,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["ctf-tools","hackthebox","htb","linux-privilege-escalation","linux-security","oscp","oscp-tools","pentest-tools","pentesting","security"],"created_at":"2024-08-01T02:01:49.242Z","updated_at":"2025-05-15T08:04:53.518Z","avatar_url":"https://github.com/sleventyeleven.png","language":"Python","readme":"\n\n# Linuxprivchecker.py\n## A Linux Privilege Escalation Check Script\n[![Known Vulnerabilities](https://snyk.io/test/github/sleventyeleven/linuxprivchecker/badge.svg?targetFile=requirements.txt)](https://snyk.io/test/github/sleventyeleven/linuxprivchecker?targetFile=requirements.txt)\n###  Orginal Author: Mike Czumak (T_v3rn1x) -- @SecuritySift\n###  Current Maintainer: Michael Contino (@Sleventyeleven)\n\nThis script is intended to be executed locally on a Linux box to enumerate basic system info and\nsearch for common privilege escalation vectors such as world writable files, misconfigurations, clear-text\npasswords and applicable exploits.\n\nLinuxprivchecker is designed to identify potential areas to investigate further, not provide direct action or exploitation.\nThis is to help users further learn how these privilege escalations work and keep it in line with the rules,\nfor self directed exploitation, laid out for the OSCP, HTB, and other CTFs/exams.\n\nWe will try our best to addtional information and reference where possible. As the current Maintainer,\nI also plan to accompany new feature adds, with a post on my blog (hackersvanguard.com) to further explain\neach potential area for privilege escalation and what criteria may be required.\n\n## Running on Legacy Python 2.6/2.7 System\nTo run on legacy python \u003e2.6 systems just get the all in one python script and run it.\n\n`wget https://raw.githubusercontent.com/sleventyeleven/linuxprivchecker/master/linuxprivchecker.py`\n\n`python linuxprivchecker.py -w -o linuxprivchecker.log`\n\n## Running on Current Python 3.X System (Beta)\nRight now Linuxprivchecker for python 3.X should be considered a stable beta versions.\nIssues can happen with the script and it certainly can miss possible vulnerabilities (open an issue or PR). \n\nTo run the python 3 version, just utilize pip.\n\n`pip install linuxprivchecker`\n\nThen just run via commandline if runpy is available.\n\n`linuxprivchecker -w -o linuxprivchecker.log`\n\nor if runpy fails to add the script to your path\n\n`python3 -m linuxprivchecker -w -o linuxprivchecker.log`\n\n## Command Options and arguments\n\nIf the system your testing has Python 2.6 or high and/or argparser installed, you can utilize the following options.\nIf importing argparser does not work, all checks will be run and no log file will be written.\nHowever, you can still use terminal redirection to create a log, such as 'python linuxprivchecker.py \u003e linuxprivchecker.log.'\n\nusage: linuxprivchecker.py [-h] [-s] [-w] [-o OUTFILE]\n\nTry to gather system information and find likely exploits\n\noptional arguments:\n  -h, --help           show this help message and exit\n  \n  -s, --searches        Skip time consumming or resource intensive searches\n  \n  -w, --write           Wether to write a log file, can be used with -0 to\n                        specify name/location\n                        \n  -o OUTFILE, --outfile OUTFILE\n                        The file to write results (needs to be writable for\n                        current user)\n\n\n\n**Warning**\n\nThis script comes as-is with no promise of functionality or accuracy.  I have no plans to maintain updates,\nI did not write it to be efficient and in some cases you may find the functions may not produce the desired\nresults.  For example, the function that links packages to running processes is based on keywords and will\nnot always be accurate.  Also, the exploit list included in this function will need to be updated over time.\nFeel free to change or improve it any way you see fit.\n\n## Modification, Distribution, and Attribution\n\nYou are free to modify and/or distribute this script as you wish.  I only ask that you maintain original\nauthor attribution and not attempt to sell it or incorporate it into any commercial offering (as if it's\nworth anything anyway :)\n","funding_links":[],"categories":["Table of Contents","Python","Privilige Escalation","Python (1887)","security","🚀 Elevating Privileges","Operating Systems","Mobile","Linux"],"sub_categories":["Privilege Escalation","Standard Scripts for Enumeration","🧰 Standard Scripts for Enumeration (CTF Cheatsheet)","Linux","Linux/ *Nix","Tools"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fsleventyeleven%2Flinuxprivchecker","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fsleventyeleven%2Flinuxprivchecker","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fsleventyeleven%2Flinuxprivchecker/lists"}