BeRoot – A Post Exploitation Privilege Escalation Tool

BeRoot is a post-exploitation tool to check for common misconfigurations which can allow an attacker to escalate their privileges. The main goal of BeRoot is to print only the information that has been found as a possible way for privilege escalation rather than  a configuration assessment of the host by listing all services, all processes, […]