2023-07-15 17:15:38 +00:00
|
|
|
{ lib
|
2021-04-19 03:05:28 +00:00
|
|
|
, buildGoModule
|
|
|
|
, fetchFromGitHub
|
|
|
|
}:
|
|
|
|
|
|
|
|
buildGoModule rec {
|
|
|
|
pname = "traitor";
|
2022-03-10 19:12:11 +00:00
|
|
|
version = "0.0.14";
|
2021-04-19 03:05:28 +00:00
|
|
|
|
|
|
|
src = fetchFromGitHub {
|
|
|
|
owner = "liamg";
|
|
|
|
repo = pname;
|
|
|
|
rev = "v${version}";
|
2022-03-10 19:12:11 +00:00
|
|
|
sha256 = "sha256-LQfKdjZaTm5z8DUt6He/RJHbOUCUwP3CV3Fyt5rJIfU=";
|
2021-04-19 03:05:28 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
vendorSha256 = null;
|
|
|
|
|
|
|
|
meta = with lib; {
|
|
|
|
description = "Automatic Linux privilege escalation";
|
|
|
|
longDescription = ''
|
|
|
|
Automatically exploit low-hanging fruit to pop a root shell. Traitor packages
|
|
|
|
up a bunch of methods to exploit local misconfigurations and vulnerabilities
|
|
|
|
(including most of GTFOBins) in order to pop a root shell.
|
|
|
|
'';
|
|
|
|
homepage = "https://github.com/liamg/traitor";
|
2022-07-14 12:49:19 +00:00
|
|
|
platforms = platforms.linux;
|
2021-04-19 03:05:28 +00:00
|
|
|
license = with licenses; [ mit ];
|
|
|
|
maintainers = with maintainers; [ fab ];
|
|
|
|
};
|
|
|
|
}
|