If you find PrivForge useful, consider supporting development with a coffee ☕️
PrivForge is a modular Linux Privilege Escalation Toolkit written in Python, designed to assist security professionals and penetration testers in identifying and exploiting local privilege escalation vectors.
⚡ Lightweight, interactive, and highly effective — use
pf
to launch PrivForge from your terminal.
-
🧱 Offline GTFO: Integrated local GTFOBins-style exploit reference — no need for internet access.
-
🎭 Backdoor Installer:
- PAM module injection
- Netcat-based malicious service installation
-
📁 PATH Exploitation Toolkit:
- Full support for
LD_PRELOAD
, with C language binary injection
- Full support for
-
🌐 NFS Exploiter:
- Shell access via shared mount manipulation
-
🎨 Beautiful CLI Interface using the
Rich
library -
🔐 Safe Execution Mode: Preview before execution to reduce risks on production environments
- Python 3.7+
- Linux environment
- Optional:
ncat
,mount
,gcc
, and other system binaries (depending on exploit module)
pip install privforge
#After installation completed run this command : pf
This tool is intended for educational and authorized security testing purposes only. Unauthorized use of this software to compromise systems you do not own is illegal.
Feel free to open issues or submit pull requests on the GitHub repository. Contributions and feedback are welcome!
This project is licensed under the GPLv3 License. See the LICENSE file for details.