Star 历史趋势
数据来源: GitHub API · 生成自 Stargazers.cn
README.md

rootOS

Tries to use various CVEs to gain sudo or root access. All exploits have an end goal of adding ALL ALL=(ALL) NOPASSWD: ALL to /etc/sudoers allowing any user to run sudo commands.

screenshot

Run

python root.py

Exploits

NameCVEDateLink(s)
ARDAgentCVE-2008-283006/23/2008https://nvd.nist.gov/vuln/detail/CVE-2008-2830
DYLD_PRINT_TO_FILECVE-2015-376008/16/2015https://nvd.nist.gov/vuln/detail/CVE-2015-3760 https://twitter.com/i0n1c/status/623727538234368000
MallocLogCVE-2015-58890/09/2015https://nvd.nist.gov/vuln/detail/CVE-2015-5889
Proxifier SanitizeCVE-2017-764304/14/2017https://nvd.nist.gov/vuln/detail/CVE-2017-7643
Sera Local Pass10/31/2017https://m4.rkw.io/blog/cve201715918-sera-12-local-root-privesc-and-password-disclosure.html
NoPassCVE-2017-1387211/29/2017https://nvd.nist.gov/vuln/detail/CVE-2017-13872 https://objective-see.com/blog/blog_0x24.html
KeyStealCVE-2019-852606/01/2019https://github.com/LinusHenze/Keysteal
AppleScript Dynamic Phishinghttps://github.com/thehappydinoa/rootOS/blob/master/apps.json
Sudo Piggybackhttps://www.n00py.io/2016/10/privilege-escalation-on-os-x-without-exploits/

Dynamic Phishing

phishing

Please note the dynamic icon and prompt

Additional Exploits

License

MIT

关于 About

macOS Privilege Escalation Helper

语言 Languages

Python100.0%

提交活跃度 Commit Activity

代码提交热力图
过去 52 周的开发活跃度
0
Total Commits
峰值: 1次/周
Less
More

核心贡献者 Contributors