Thanks to visit codestin.com
Credit goes to github.com

Skip to content

AmianDevSec/PrivForge

Repository files navigation

PrivForge Icon

Buy Me a Coffee at Ko-fi
If you find PrivForge useful, consider supporting development with a coffee ☕️

PrivForge (pf) 🛠️

GitHub Release

PrivForge is a modular Linux Privilege Escalation Toolkit written in Python, designed to assist security professionals and penetration testers in identifying and exploiting local privilege escalation vectors.

⚡ Lightweight, interactive, and highly effective — use pf to launch PrivForge from your terminal.


🎯 The current version includes these features

  • 🧱 Offline GTFO: Integrated local GTFOBins-style exploit reference — no need for internet access.

  • 🎭 Backdoor Installer:

    • PAM module injection
    • Netcat-based malicious service installation
  • 📁 PATH Exploitation Toolkit:

    • Full support for LD_PRELOAD, with C language binary injection
  • 🌐 NFS Exploiter:

    • Shell access via shared mount manipulation
  • 🎨 Beautiful CLI Interface using the Rich library

  • 🔐 Safe Execution Mode: Preview before execution to reduce risks on production environments


🚀 Quick Start

🔧 Requirements

  • Python 3.7+
  • Linux environment
  • Optional: ncat, mount, gcc, and other system binaries (depending on exploit module)

📦 Installation

pip install privforge

#After installation completed run this command : pf 

🛡️ Disclaimer

This tool is intended for educational and authorized security testing purposes only. Unauthorized use of this software to compromise systems you do not own is illegal.

🙌 Contribution

Feel free to open issues or submit pull requests on the GitHub repository. Contributions and feedback are welcome!


📃 License

This project is licensed under the GPLv3 License. See the LICENSE file for details.