Skip to content
#

suid-exploitation

Here are 4 public repositories matching this topic...

Language: All
Filter by language

Take a Linux system and probe for privilege escalation vectors, kernel vulnerabilities, and misconfigurations with parallel scanning and intelligent exploit chaining. Designed for authorized security assessments, penetration testing, and hardening validation.

  • Updated Feb 4, 2026
  • Shell

Improve this page

Add a description, image, and links to the suid-exploitation topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the suid-exploitation topic, visit your repo's landing page and select "manage topics."

Learn more