A sophisticated privilege escalation toolkit designed to automate the process of gaining root access on vulnerable servers. This tool checks system capabilities and attempts various escalation techniques.
- System capability assessment (GCC, Python, pkexec)
- Automated privilege escalation attempt
- Root shell establishment if successful
- Clean, intuitive interface with status monitoring
- Dark theme for comfortable usage
- Web server with PHP support
- Basic system utilities (GCC, Python)
- Vulnerable system configuration (pkexec vulnerability)
- Upload the
index.php
file to your target server - Ensure the web directory has write permissions
- Access the file through a web browser
wget https://raw.githubusercontent.com/JawaTengahXploit1337/Auto-Root-Server/main/root.php
- Access the tool through your web browser
- Review system status indicators (all must be green)
- Click "Attempt Privilege Escalation" button
- If successful, click the provided link to access root shell
The toolkit works by:
- Checking system capabilities
- Compiling and executing a privilege escalation exploit
- Establishing a root shell if vulnerabilities exist
The developer assumes no liability and is not responsible for any misuse or damage caused by this program. Use this tool only on systems you have explicit permission to test.
Pull requests are welcome. For major changes, please open an issue first to discuss what you would like to change.
### Recommended additions for your repository:
1. Create a `preview.png` showing your tool's interface
2. Add a `demo.gif` showing the tool in action
3. Include a `LICENSE` file (MIT recommended)
4. Add a `.gitignore` file for PHP
The README provides:
- Clear installation/usage instructions
- Visual aids (placeholders for images)
- Important legal warnings
- Professional structure that encourages responsible use
You can customize the "[yourusername/auto-root-toolkit]" parts with your actual GitHub username and repository name.