A Python script that parses your SUID/SGID enumeration output and checks which binaries are exploitable according to GTFOBins. Supports both online and offline (local database) modes.
-
Updated
Dec 24, 2025 - Python
A Python script that parses your SUID/SGID enumeration output and checks which binaries are exploitable according to GTFOBins. Supports both online and offline (local database) modes.
Script to find the binaries which are vulnerable to SUID bit privilege escalation in the Linux enviroment.
Take a Linux system and probe for privilege escalation vectors, kernel vulnerabilities, and misconfigurations with parallel scanning and intelligent exploit chaining. Designed for authorized security assessments, penetration testing, and hardening validation.
[
[First-Blood-XO] React Server Component endpoint vulnerable to CVE-2025-55182 (RCE) → enumerated SUID binaries → /usr/bin/perl had SUID set → used Perl's POSIX setuid(0) to escalate to root → read /root/flag.txt
Add a description, image, and links to the suid-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the suid-exploitation topic, visit your repo's landing page and select "manage topics."