2021-04-18 14:00:57 +02:00
|
|
|
{ lib
|
|
|
|
, buildGoModule
|
|
|
|
, fetchFromGitHub
|
|
|
|
}:
|
|
|
|
|
|
|
|
buildGoModule rec {
|
|
|
|
pname = "traitor";
|
2021-07-03 17:32:30 +02:00
|
|
|
version = "0.0.8";
|
2021-04-18 14:00:57 +02:00
|
|
|
|
|
|
|
src = fetchFromGitHub {
|
|
|
|
owner = "liamg";
|
|
|
|
repo = pname;
|
|
|
|
rev = "v${version}";
|
2021-07-03 17:32:30 +02:00
|
|
|
sha256 = "sha256-eUeKkjSpKel6XH3/VVw/WPCG/Nq8BcZwMNFG9z9FUuU=";
|
2021-04-18 14:00:57 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
vendorSha256 = null;
|
|
|
|
|
|
|
|
meta = with lib; {
|
|
|
|
description = "Automatic Linux privilege escalation";
|
|
|
|
longDescription = ''
|
|
|
|
Automatically exploit low-hanging fruit to pop a root shell. Traitor packages
|
|
|
|
up a bunch of methods to exploit local misconfigurations and vulnerabilities
|
|
|
|
(including most of GTFOBins) in order to pop a root shell.
|
|
|
|
'';
|
|
|
|
homepage = "https://github.com/liamg/traitor";
|
|
|
|
license = with licenses; [ mit ];
|
|
|
|
maintainers = with maintainers; [ fab ];
|
|
|
|
};
|
|
|
|
}
|