linux-file-path-abuse

Official

Escalate Linux privileges via file, path, and group abuse.

Authorblacklanternsecurity
Version1.0.0
Installs0

System Documentation

What problem does it solve?

This Skill helps you gain higher privileges on a Linux system by exploiting common misconfigurations related to file permissions, group memberships, and executable paths.

Core Features & Use Cases

  • Writable File Exploitation: Leverages writable critical files like /etc/passwd or /etc/sudoers.
  • NFS & Group Privileges: Exploits no_root_squash NFS shares and privileged group memberships (docker, lxd, disk).
  • Path & Library Hijacking: Injects malicious code via writable PATH directories or shared library loading vulnerabilities.
  • Use Case: If you find that a user is part of the docker group, you can use this Skill to mount the host filesystem within a container and gain root access on the host.

Quick Start

Use the linux-file-path-abuse skill to exploit writable critical files on the target system.

Dependency Matrix

Required Modules

None required

Components

scripts

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: linux-file-path-abuse
Download link: https://github.com/blacklanternsecurity/red-run/archive/main.zip#linux-file-path-abuse

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.