PoC-in-GitHub/2025/CVE-2025-32463.json
2025-12-02 03:45:21 +09:00

2348 lines
No EOL
81 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 1011812779,
"name": "CVE-2025-32463_chwoot",
"full_name": "pr0v3rbs\/CVE-2025-32463_chwoot",
"owner": {
"login": "pr0v3rbs",
"id": 8536529,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8536529?v=4",
"html_url": "https:\/\/github.com\/pr0v3rbs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/pr0v3rbs\/CVE-2025-32463_chwoot",
"description": "Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463",
"fork": false,
"created_at": "2025-07-01T11:26:15Z",
"updated_at": "2025-11-28T14:25:55Z",
"pushed_at": "2025-11-19T13:30:29Z",
"stargazers_count": 490,
"watchers_count": 490,
"has_discussions": false,
"forks_count": 95,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"docker",
"docker-container",
"docker-image",
"eop",
"escalate-privilages",
"exploit",
"linux",
"lpe",
"poc",
"privilege-escalation",
"privilege-escalation-exploits",
"proof-of-concept",
"proof-of-work",
"scanner",
"sudo",
"tools",
"vulnerability"
],
"visibility": "public",
"forks": 95,
"watchers": 490,
"score": 0,
"subscribers_count": 2
},
{
"id": 1011882826,
"name": "CVE-2025-32463",
"full_name": "4f-kira\/CVE-2025-32463",
"owner": {
"login": "4f-kira",
"id": 15325007,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15325007?v=4",
"html_url": "https:\/\/github.com\/4f-kira",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/4f-kira\/CVE-2025-32463",
"description": null,
"fork": false,
"created_at": "2025-07-01T13:29:02Z",
"updated_at": "2025-07-02T05:58:06Z",
"pushed_at": "2025-07-01T13:37:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 1011894465,
"name": "CVE-2025-32463-POC",
"full_name": "K1tt3h\/CVE-2025-32463-POC",
"owner": {
"login": "K1tt3h",
"id": 218786764,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/218786764?v=4",
"html_url": "https:\/\/github.com\/K1tt3h",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/K1tt3h\/CVE-2025-32463-POC",
"description": "CVE-2025-32463 Proof of concept",
"fork": false,
"created_at": "2025-07-01T13:48:05Z",
"updated_at": "2025-09-22T14:53:37Z",
"pushed_at": "2025-07-01T14:02:22Z",
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 24,
"score": 0,
"subscribers_count": 0
},
{
"id": 1011960984,
"name": "linux-root-kit",
"full_name": "IC3-512\/linux-root-kit",
"owner": {
"login": "IC3-512",
"id": 101519486,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101519486?v=4",
"html_url": "https:\/\/github.com\/IC3-512",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/IC3-512\/linux-root-kit",
"description": "End-to-end simulation of a Python dependency confusion attack, sudo privilege escalation (CVE-2025-32463), and rootkit-based persistence - with full memory and network forensic analysis.",
"fork": false,
"created_at": "2025-07-01T15:36:10Z",
"updated_at": "2025-08-16T12:09:23Z",
"pushed_at": "2025-07-20T13:50:41Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2025-32463",
"dependency-confusion-attack",
"digital-forensics",
"linux-kernel-module",
"reverse-engineering",
"rootkit-kernel"
],
"visibility": "public",
"forks": 0,
"watchers": 9,
"score": 0,
"subscribers_count": 0
},
{
"id": 1012169568,
"name": "cve-2025-32463-lab",
"full_name": "7r00t\/cve-2025-32463-lab",
"owner": {
"login": "7r00t",
"id": 123947406,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123947406?v=4",
"html_url": "https:\/\/github.com\/7r00t",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/7r00t\/cve-2025-32463-lab",
"description": null,
"fork": false,
"created_at": "2025-07-01T23:41:25Z",
"updated_at": "2025-10-06T09:16:07Z",
"pushed_at": "2025-07-01T23:53:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1012210627,
"name": "CVE-2025-32463",
"full_name": "SysMancer\/CVE-2025-32463",
"owner": {
"login": "SysMancer",
"id": 71742137,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71742137?v=4",
"html_url": "https:\/\/github.com\/SysMancer",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/SysMancer\/CVE-2025-32463",
"description": null,
"fork": false,
"created_at": "2025-07-02T01:57:33Z",
"updated_at": "2025-07-08T16:43:44Z",
"pushed_at": "2025-07-02T02:04:30Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 0
},
{
"id": 1012337321,
"name": "CVE-2025-32463",
"full_name": "kh4sh3i\/CVE-2025-32463",
"owner": {
"login": "kh4sh3i",
"id": 64693844,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64693844?v=4",
"html_url": "https:\/\/github.com\/kh4sh3i",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/kh4sh3i\/CVE-2025-32463",
"description": "Local Privilege Escalation to Root via Sudo chroot in Linux",
"fork": false,
"created_at": "2025-07-02T07:20:20Z",
"updated_at": "2025-11-29T01:58:35Z",
"pushed_at": "2025-07-02T08:04:44Z",
"stargazers_count": 407,
"watchers_count": 407,
"has_discussions": false,
"forks_count": 58,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"chroot",
"exploit",
"linux",
"lpe",
"poc",
"privelage-escalation",
"scanner",
"sudo",
"tools",
"ubuntu",
"vulnerability"
],
"visibility": "public",
"forks": 58,
"watchers": 407,
"score": 0,
"subscribers_count": 3
},
{
"id": 1012385228,
"name": "CVE-2025-32463_Exploit",
"full_name": "neko205-mx\/CVE-2025-32463_Exploit",
"owner": {
"login": "neko205-mx",
"id": 69409093,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69409093?v=4",
"html_url": "https:\/\/github.com\/neko205-mx",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/neko205-mx\/CVE-2025-32463_Exploit",
"description": null,
"fork": false,
"created_at": "2025-07-02T08:53:44Z",
"updated_at": "2025-07-02T08:59:30Z",
"pushed_at": "2025-07-02T08:59:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1012476846,
"name": "CVE-2025-32463",
"full_name": "pevinkumar10\/CVE-2025-32463",
"owner": {
"login": "pevinkumar10",
"id": 191495526,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/191495526?v=4",
"html_url": "https:\/\/github.com\/pevinkumar10",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/pevinkumar10\/CVE-2025-32463",
"description": "Exploit for Local Privilege Escalation in Sudo via Malicious nsswitch.conf with sudo -R. (CVE-2025-32463) ",
"fork": false,
"created_at": "2025-07-02T11:47:58Z",
"updated_at": "2025-09-30T17:46:24Z",
"pushed_at": "2025-07-05T11:13:26Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 1012569637,
"name": "CVE-2025-32463_POC",
"full_name": "zhaduchanhzz\/CVE-2025-32463_POC",
"owner": {
"login": "zhaduchanhzz",
"id": 76047186,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76047186?v=4",
"html_url": "https:\/\/github.com\/zhaduchanhzz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zhaduchanhzz\/CVE-2025-32463_POC",
"description": null,
"fork": false,
"created_at": "2025-07-02T14:29:49Z",
"updated_at": "2025-07-02T15:07:10Z",
"pushed_at": "2025-07-02T15:07:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1012696307,
"name": "CVE-2025-32463_POC",
"full_name": "robbert1978\/CVE-2025-32463_POC",
"owner": {
"login": "robbert1978",
"id": 31349426,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31349426?v=4",
"html_url": "https:\/\/github.com\/robbert1978",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/robbert1978\/CVE-2025-32463_POC",
"description": null,
"fork": false,
"created_at": "2025-07-02T18:26:29Z",
"updated_at": "2025-07-02T18:30:06Z",
"pushed_at": "2025-07-02T18:30:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1012904280,
"name": "sudoinjection",
"full_name": "Mikivirus0\/sudoinjection",
"owner": {
"login": "Mikivirus0",
"id": 85563293,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85563293?v=4",
"html_url": "https:\/\/github.com\/Mikivirus0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Mikivirus0\/sudoinjection",
"description": "Sudo Local Privilege Escalation CVE-2025-32463 (Best For Cases Where the shell is not stable to spawn a new root shell)",
"fork": false,
"created_at": "2025-07-03T04:24:54Z",
"updated_at": "2025-11-26T12:27:25Z",
"pushed_at": "2025-07-03T04:27:29Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 1013083894,
"name": "CVE-2025-32463",
"full_name": "nflatrea\/CVE-2025-32463",
"owner": {
"login": "nflatrea",
"id": 120607606,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120607606?v=4",
"html_url": "https:\/\/github.com\/nflatrea",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/nflatrea\/CVE-2025-32463",
"description": "Sudo chroot privileged escalation PoC",
"fork": false,
"created_at": "2025-07-03T10:31:44Z",
"updated_at": "2025-07-11T06:26:08Z",
"pushed_at": "2025-07-03T21:01:50Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 1013125878,
"name": "CVE-2025-32463",
"full_name": "san8383\/CVE-2025-32463",
"owner": {
"login": "san8383",
"id": 19327440,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19327440?v=4",
"html_url": "https:\/\/github.com\/san8383",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/san8383\/CVE-2025-32463",
"description": null,
"fork": false,
"created_at": "2025-07-03T11:55:29Z",
"updated_at": "2025-11-14T22:52:05Z",
"pushed_at": "2025-07-03T12:00:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1013127277,
"name": "CVE-2025-32463",
"full_name": "0xAkarii\/CVE-2025-32463",
"owner": {
"login": "0xAkarii",
"id": 69517667,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69517667?v=4",
"html_url": "https:\/\/github.com\/0xAkarii",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xAkarii\/CVE-2025-32463",
"description": null,
"fork": false,
"created_at": "2025-07-03T11:58:12Z",
"updated_at": "2025-07-03T11:58:39Z",
"pushed_at": "2025-07-03T11:58:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1013356616,
"name": "sudo_patch_CVE-2025-32463",
"full_name": "CIA911\/sudo_patch_CVE-2025-32463",
"owner": {
"login": "CIA911",
"id": 48140538,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48140538?v=4",
"html_url": "https:\/\/github.com\/CIA911",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/CIA911\/sudo_patch_CVE-2025-32463",
"description": "Mr.CIA's manual patching guide for CVE-2025-32463 (Sudo local privilege escalation) on Kali Linux and Ubuntu WSL.",
"fork": false,
"created_at": "2025-07-03T19:04:11Z",
"updated_at": "2025-10-29T13:05:21Z",
"pushed_at": "2025-07-03T20:03:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 1013396078,
"name": "CVE-2025-32463-sudo-chwoot",
"full_name": "mirchr\/CVE-2025-32463-sudo-chwoot",
"owner": {
"login": "mirchr",
"id": 6902669,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6902669?v=4",
"html_url": "https:\/\/github.com\/mirchr",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mirchr\/CVE-2025-32463-sudo-chwoot",
"description": "PoC for CVE-2025-32463 - Sudo chroot Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2025-07-03T20:40:10Z",
"updated_at": "2025-11-15T15:04:39Z",
"pushed_at": "2025-07-05T16:22:28Z",
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 18,
"score": 0,
"subscribers_count": 0
},
{
"id": 1013781214,
"name": "CVE-2025-32463_illdeed",
"full_name": "ill-deed\/CVE-2025-32463_illdeed",
"owner": {
"login": "ill-deed",
"id": 210107232,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/210107232?v=4",
"html_url": "https:\/\/github.com\/ill-deed",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ill-deed\/CVE-2025-32463_illdeed",
"description": "Privilege escalation exploit for CVE-2025-32463 using a malicious NSS module injected via sudo -R. This version creates a stealth payload called illdeed, granting root access through a controlled chroot environment.",
"fork": false,
"created_at": "2025-07-04T13:02:46Z",
"updated_at": "2025-07-04T13:38:05Z",
"pushed_at": "2025-07-04T13:38:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1013786973,
"name": "CVE-2025-32463",
"full_name": "zinzloun\/CVE-2025-32463",
"owner": {
"login": "zinzloun",
"id": 24391516,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24391516?v=4",
"html_url": "https:\/\/github.com\/zinzloun",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zinzloun\/CVE-2025-32463",
"description": "# CVE-2025-32463 Sudo EoP Exploit (PoC) with precompiled .so",
"fork": false,
"created_at": "2025-07-04T13:13:31Z",
"updated_at": "2025-11-16T21:50:02Z",
"pushed_at": "2025-07-14T10:07:09Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 10,
"score": 0,
"subscribers_count": 0
},
{
"id": 1013939074,
"name": "CVE-2025-32463_chwoot",
"full_name": "yeremeu\/CVE-2025-32463_chwoot",
"owner": {
"login": "yeremeu",
"id": 192310234,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192310234?v=4",
"html_url": "https:\/\/github.com\/yeremeu",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/yeremeu\/CVE-2025-32463_chwoot",
"description": "Demonstrate CVE-2025-32463 with this PoC for sudo's chroot feature. Explore the exploit and its impact on vulnerable sudo versions. 🐱💻🔒",
"fork": false,
"created_at": "2025-07-04T18:20:09Z",
"updated_at": "2025-12-01T16:33:58Z",
"pushed_at": "2025-12-01T16:33:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1013973489,
"name": "CVE-2025-32463-POC",
"full_name": "cyberpoul\/CVE-2025-32463-POC",
"owner": {
"login": "cyberpoul",
"id": 143470757,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143470757?v=4",
"html_url": "https:\/\/github.com\/cyberpoul",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cyberpoul\/CVE-2025-32463-POC",
"description": "🛡️ Proof of Concept (PoC) for CVE-2025-32463 — Local privilege escalation in sudo (versions 1.9.14 to 1.9.17). This exploit abuses the --chroot option and a malicious nsswitch.conf to execute arbitrary code as root. ⚠️ For educational and authorized testing only.",
"fork": false,
"created_at": "2025-07-04T19:49:59Z",
"updated_at": "2025-08-07T04:02:03Z",
"pushed_at": "2025-08-07T04:01:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1014021787,
"name": "Blackash-CVE-2025-32463",
"full_name": "Ashwesker\/Blackash-CVE-2025-32463",
"owner": {
"login": "Ashwesker",
"id": 215029052,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/215029052?v=4",
"html_url": "https:\/\/github.com\/Ashwesker",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Ashwesker\/Blackash-CVE-2025-32463",
"description": "CVE-2025-32463",
"fork": false,
"created_at": "2025-07-04T22:28:47Z",
"updated_at": "2025-07-05T12:05:26Z",
"pushed_at": "2025-07-05T12:05:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1014379767,
"name": "CVE-2025-32463",
"full_name": "junxian428\/CVE-2025-32463",
"owner": {
"login": "junxian428",
"id": 58724748,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58724748?v=4",
"html_url": "https:\/\/github.com\/junxian428",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/junxian428\/CVE-2025-32463",
"description": "Linux distributions: Affects Ubuntu, Debian, Fedora, CentOS, SUSE, Amazon Linux, and others shipping sudo v1.9.141.9.17",
"fork": false,
"created_at": "2025-07-05T15:55:49Z",
"updated_at": "2025-10-30T10:29:16Z",
"pushed_at": "2025-07-05T16:02:09Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 10,
"score": 0,
"subscribers_count": 0
},
{
"id": 1014726969,
"name": "CVE-2025-32463-PoC",
"full_name": "FreeDurok\/CVE-2025-32463-PoC",
"owner": {
"login": "FreeDurok",
"id": 43138030,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43138030?v=4",
"html_url": "https:\/\/github.com\/FreeDurok",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/FreeDurok\/CVE-2025-32463-PoC",
"description": "Proof of Concept for CVE-2025-32463 Local privilege escalation exploit targeting sudo -R on vulnerable Linux systems. For educational and authorized security testing only.",
"fork": false,
"created_at": "2025-07-06T09:45:40Z",
"updated_at": "2025-08-23T13:49:04Z",
"pushed_at": "2025-08-23T13:49:01Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0,
"subscribers_count": 0
},
{
"id": 1014792569,
"name": "CVE-2025-32463-lab",
"full_name": "Chocapikk\/CVE-2025-32463-lab",
"owner": {
"login": "Chocapikk",
"id": 88535377,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
"html_url": "https:\/\/github.com\/Chocapikk",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2025-32463-lab",
"description": null,
"fork": false,
"created_at": "2025-07-06T12:32:09Z",
"updated_at": "2025-11-07T12:42:39Z",
"pushed_at": "2025-07-06T13:57:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1015017138,
"name": "CVE-2025-32463-EXPLOIT",
"full_name": "K3ysTr0K3R\/CVE-2025-32463-EXPLOIT",
"owner": {
"login": "K3ysTr0K3R",
"id": 70909693,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
"html_url": "https:\/\/github.com\/K3ysTr0K3R",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2025-32463-EXPLOIT",
"description": "A PoC exploit for CVE-2025-32463 - Sudo Privilege Escalation",
"fork": false,
"created_at": "2025-07-06T21:15:17Z",
"updated_at": "2025-11-30T12:39:37Z",
"pushed_at": "2025-07-06T22:44:16Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"exploit",
"poc",
"privilege-escalation",
"root",
"sudo-privilege-escalation"
],
"visibility": "public",
"forks": 0,
"watchers": 6,
"score": 0,
"subscribers_count": 0
},
{
"id": 1016049917,
"name": "cve-2025-32463",
"full_name": "SpongeBob-369\/cve-2025-32463",
"owner": {
"login": "SpongeBob-369",
"id": 176364273,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176364273?v=4",
"html_url": "https:\/\/github.com\/SpongeBob-369",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/SpongeBob-369\/cve-2025-32463",
"description": "# cve-2025-32463 - Local Privilege Escalation to Root via Sudo chroot in Linux",
"fork": false,
"created_at": "2025-07-08T12:16:25Z",
"updated_at": "2025-07-16T08:02:24Z",
"pushed_at": "2025-07-09T11:47:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1016090108,
"name": "CVE-2025-32463_sudo_chroot",
"full_name": "lowercasenumbers\/CVE-2025-32463_sudo_chroot",
"owner": {
"login": "lowercasenumbers",
"id": 95596630,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95596630?v=4",
"html_url": "https:\/\/github.com\/lowercasenumbers",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/lowercasenumbers\/CVE-2025-32463_sudo_chroot",
"description": null,
"fork": false,
"created_at": "2025-07-08T13:26:01Z",
"updated_at": "2025-11-19T13:45:32Z",
"pushed_at": "2025-11-19T13:45:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1016251144,
"name": "CVE-2025-32463_Sudo_PoC",
"full_name": "abrewer251\/CVE-2025-32463_Sudo_PoC",
"owner": {
"login": "abrewer251",
"id": 150287770,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150287770?v=4",
"html_url": "https:\/\/github.com\/abrewer251",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/abrewer251\/CVE-2025-32463_Sudo_PoC",
"description": "PoC for CVE-2025-32463: Local privilege escalation in sudo via --chroot. Exploits NSS module injection through crafted chroot environments. Designed for security researchers and lab-only environments.",
"fork": false,
"created_at": "2025-07-08T18:05:30Z",
"updated_at": "2025-07-11T14:15:17Z",
"pushed_at": "2025-07-08T18:07:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1016942456,
"name": "CVE-2025-32463-EXPLOIT",
"full_name": "0xb0rn3\/CVE-2025-32463-EXPLOIT",
"owner": {
"login": "0xb0rn3",
"id": 154826956,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154826956?v=4",
"html_url": "https:\/\/github.com\/0xb0rn3",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xb0rn3\/CVE-2025-32463-EXPLOIT",
"description": null,
"fork": false,
"created_at": "2025-07-09T19:10:50Z",
"updated_at": "2025-07-09T21:56:47Z",
"pushed_at": "2025-07-09T20:55:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1018099412,
"name": "sudo-chroot-CVE-2025-32463",
"full_name": "morgenm\/sudo-chroot-CVE-2025-32463",
"owner": {
"login": "morgenm",
"id": 51513125,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51513125?v=4",
"html_url": "https:\/\/github.com\/morgenm",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/morgenm\/sudo-chroot-CVE-2025-32463",
"description": "Rust PoC for CVE-2025-32463 (sudo chroot \"chwoot\" Local PrivEsc)",
"fork": false,
"created_at": "2025-07-11T15:51:21Z",
"updated_at": "2025-07-11T18:08:38Z",
"pushed_at": "2025-07-11T16:55:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"chroot",
"chwoot",
"cybersecurity",
"exploit",
"linux",
"poc",
"privilege-escalation",
"sudo",
"vulnerability"
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1019810128,
"name": "CVE-2025-32463",
"full_name": "MohamedKarrab\/CVE-2025-32463",
"owner": {
"login": "MohamedKarrab",
"id": 107933631,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107933631?v=4",
"html_url": "https:\/\/github.com\/MohamedKarrab",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MohamedKarrab\/CVE-2025-32463",
"description": "Privilege escalation to root using sudo chroot, NO NEED for gcc installed.",
"fork": false,
"created_at": "2025-07-14T23:07:56Z",
"updated_at": "2025-11-25T20:24:13Z",
"pushed_at": "2025-10-06T18:11:14Z",
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"chroot",
"cve-2025-32463",
"exploit",
"linux",
"poc",
"privesc",
"privilege-escalation",
"root",
"sudo",
"ubuntu",
"vulnerability"
],
"visibility": "public",
"forks": 9,
"watchers": 41,
"score": 0,
"subscribers_count": 2
},
{
"id": 1019812445,
"name": "cve-2025-32463-lab",
"full_name": "dbarquero\/cve-2025-32463-lab",
"owner": {
"login": "dbarquero",
"id": 30609931,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30609931?v=4",
"html_url": "https:\/\/github.com\/dbarquero",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dbarquero\/cve-2025-32463-lab",
"description": "Educational Docker lab to simulate privilege escalation via CVE-2025-32463",
"fork": false,
"created_at": "2025-07-14T23:16:18Z",
"updated_at": "2025-07-16T04:28:19Z",
"pushed_at": "2025-07-16T04:28:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1020772228,
"name": "CVE-2025-32463-Chwoot-POC",
"full_name": "krypton-0x00\/CVE-2025-32463-Chwoot-POC",
"owner": {
"login": "krypton-0x00",
"id": 164741690,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164741690?v=4",
"html_url": "https:\/\/github.com\/krypton-0x00",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/krypton-0x00\/CVE-2025-32463-Chwoot-POC",
"description": null,
"fork": false,
"created_at": "2025-07-16T11:21:12Z",
"updated_at": "2025-07-16T11:21:56Z",
"pushed_at": "2025-07-16T11:21:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1020961914,
"name": "CVE-2025-32463",
"full_name": "Floodnut\/CVE-2025-32463",
"owner": {
"login": "Floodnut",
"id": 15941204,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15941204?v=4",
"html_url": "https:\/\/github.com\/Floodnut",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Floodnut\/CVE-2025-32463",
"description": null,
"fork": false,
"created_at": "2025-07-16T16:55:44Z",
"updated_at": "2025-07-16T16:59:56Z",
"pushed_at": "2025-07-16T16:59:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1021249252,
"name": "CVE-2025-32463",
"full_name": "Rajneeshkarya\/CVE-2025-32463",
"owner": {
"login": "Rajneeshkarya",
"id": 125280130,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125280130?v=4",
"html_url": "https:\/\/github.com\/Rajneeshkarya",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Rajneeshkarya\/CVE-2025-32463",
"description": "This is the exploit for the CVE-2025-32463",
"fork": false,
"created_at": "2025-07-17T05:57:39Z",
"updated_at": "2025-07-17T06:16:38Z",
"pushed_at": "2025-07-17T06:16:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1021982841,
"name": "CVE-2025-32463",
"full_name": "MGunturG\/CVE-2025-32463",
"owner": {
"login": "MGunturG",
"id": 39583921,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39583921?v=4",
"html_url": "https:\/\/github.com\/MGunturG",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MGunturG\/CVE-2025-32463",
"description": "Local Privilege Escalation to Root via Sudo chroot in Linux ",
"fork": false,
"created_at": "2025-07-18T09:03:27Z",
"updated_at": "2025-07-18T12:10:13Z",
"pushed_at": "2025-07-18T12:10:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1022031654,
"name": "Sudo-CVE-2021-3156",
"full_name": "Maalfer\/Sudo-CVE-2021-3156",
"owner": {
"login": "Maalfer",
"id": 96432001,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96432001?v=4",
"html_url": "https:\/\/github.com\/Maalfer",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Maalfer\/Sudo-CVE-2021-3156",
"description": "Exploit para explotar la vulnerabilidad CVE-2025-32463",
"fork": false,
"created_at": "2025-07-18T10:39:27Z",
"updated_at": "2025-11-18T21:24:33Z",
"pushed_at": "2025-07-19T10:00:10Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 0
},
{
"id": 1023122028,
"name": "CVE-2025-32463",
"full_name": "daryllundy\/CVE-2025-32463",
"owner": {
"login": "daryllundy",
"id": 8924499,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8924499?v=4",
"html_url": "https:\/\/github.com\/daryllundy",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/daryllundy\/CVE-2025-32463",
"description": null,
"fork": false,
"created_at": "2025-07-20T15:16:41Z",
"updated_at": "2025-07-20T15:17:13Z",
"pushed_at": "2025-07-20T15:17:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1023724044,
"name": "Sudo-Privilege-Escalation-Linux-CVE-2025-32463-and-CVE-2025-32462",
"full_name": "AdityaBhatt3010\/Sudo-Privilege-Escalation-Linux-CVE-2025-32463-and-CVE-2025-32462",
"owner": {
"login": "AdityaBhatt3010",
"id": 96762636,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96762636?v=4",
"html_url": "https:\/\/github.com\/AdityaBhatt3010",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/AdityaBhatt3010\/Sudo-Privilege-Escalation-Linux-CVE-2025-32463-and-CVE-2025-32462",
"description": "A deep dive into two critical Sudo vulnerabilities (CVE202532463 & CVE202532462) that enable local privilege escalation across major Linux distributions.",
"fork": false,
"created_at": "2025-07-21T15:39:48Z",
"updated_at": "2025-11-25T17:21:58Z",
"pushed_at": "2025-07-21T16:54:23Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cybersecurity",
"linux",
"privilege-escalation",
"sudo"
],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0,
"subscribers_count": 0
},
{
"id": 1024069285,
"name": "sudo_exploit",
"full_name": "ChetanKomal\/sudo_exploit",
"owner": {
"login": "ChetanKomal",
"id": 76816799,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76816799?v=4",
"html_url": "https:\/\/github.com\/ChetanKomal",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ChetanKomal\/sudo_exploit",
"description": "CVE-2025-32463",
"fork": false,
"created_at": "2025-07-22T06:26:39Z",
"updated_at": "2025-07-22T06:28:05Z",
"pushed_at": "2025-07-22T06:28:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1028252912,
"name": "CVE-2025-32463",
"full_name": "KaiHT-Ladiant\/CVE-2025-32463",
"owner": {
"login": "KaiHT-Ladiant",
"id": 157885033,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/157885033?v=4",
"html_url": "https:\/\/github.com\/KaiHT-Ladiant",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/KaiHT-Ladiant\/CVE-2025-32463",
"description": "CVE-2025-32463 - Sudo Chroot Privilege Escalation Exploit",
"fork": false,
"created_at": "2025-07-29T08:54:15Z",
"updated_at": "2025-09-27T13:14:54Z",
"pushed_at": "2025-08-01T00:14:20Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 1028946296,
"name": "CVE-2025-32463-lab",
"full_name": "y4ney\/CVE-2025-32463-lab",
"owner": {
"login": "y4ney",
"id": 44939500,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44939500?v=4",
"html_url": "https:\/\/github.com\/y4ney",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/y4ney\/CVE-2025-32463-lab",
"description": "本项目基于 Docker 搭建了一个用于复现和测试 sudo 本地权限提升漏洞 CVE-2025-32463 的实验环境。",
"fork": false,
"created_at": "2025-07-30T09:43:23Z",
"updated_at": "2025-08-19T14:42:30Z",
"pushed_at": "2025-08-19T14:42:26Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"chroot",
"cve",
"docker",
"exploit",
"linux",
"poc",
"privilege-escalation",
"security",
"sudo",
"vulnerability-lab"
],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 0
},
{
"id": 1032635338,
"name": "CVE-2025-32463",
"full_name": "aldoClau98\/CVE-2025-32463",
"owner": {
"login": "aldoClau98",
"id": 44474118,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44474118?v=4",
"html_url": "https:\/\/github.com\/aldoClau98",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/aldoClau98\/CVE-2025-32463",
"description": "Questo script è un proof of concept (PoC) che dimostra una tecnica di privilege escalation (Elevazione di privilegi) sfruttando una vulnerabilità teorica di sudo (es. CVE-2025-32463). Il PoC forza sudo a caricare una libreria .so manipolata sfruttando la funzionalità -R (chroot) e la configurazione personalizzata di NSS (nsswitch.conf).",
"fork": false,
"created_at": "2025-08-05T15:37:37Z",
"updated_at": "2025-08-05T15:42:17Z",
"pushed_at": "2025-08-05T15:42:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1032661967,
"name": "CVE-2025-32463",
"full_name": "painoob\/CVE-2025-32463",
"owner": {
"login": "painoob",
"id": 8389015,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8389015?v=4",
"html_url": "https:\/\/github.com\/painoob",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/painoob\/CVE-2025-32463",
"description": null,
"fork": false,
"created_at": "2025-08-05T16:22:42Z",
"updated_at": "2025-08-05T16:31:15Z",
"pushed_at": "2025-08-05T16:31:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1034685183,
"name": "CVE-2025-32463",
"full_name": "Nowafen\/CVE-2025-32463",
"owner": {
"login": "Nowafen",
"id": 185528820,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/185528820?v=4",
"html_url": "https:\/\/github.com\/Nowafen",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Nowafen\/CVE-2025-32463",
"description": "This CVE addresses a vulnerability in sudo versions 1.9.14 to 1.9.17, enabling unauthorized local privilege escalation to root access.",
"fork": false,
"created_at": "2025-08-08T20:00:41Z",
"updated_at": "2025-11-29T17:33:27Z",
"pushed_at": "2025-11-29T17:33:24Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2025-32463",
"exploit",
"linux",
"lpe",
"postexplotation",
"privilege-escalation",
"sudo"
],
"visibility": "public",
"forks": 2,
"watchers": 11,
"score": 0,
"subscribers_count": 0
},
{
"id": 1045462956,
"name": "CVE-2025-32463_chwoot",
"full_name": "Yuy0ung\/CVE-2025-32463_chwoot",
"owner": {
"login": "Yuy0ung",
"id": 164923224,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164923224?v=4",
"html_url": "https:\/\/github.com\/Yuy0ung",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Yuy0ung\/CVE-2025-32463_chwoot",
"description": "用于CVE-2025-32463 sudo_chwoot的权限提升POC适配了有gcc编译环境和无gcc编译环境的两种情况下载运行即可一把梭哈",
"fork": false,
"created_at": "2025-08-27T07:59:55Z",
"updated_at": "2025-09-01T01:54:24Z",
"pushed_at": "2025-08-27T08:21:59Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 1045820635,
"name": "CVE-2025-32463",
"full_name": "hacieda\/CVE-2025-32463",
"owner": {
"login": "hacieda",
"id": 98709677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98709677?v=4",
"html_url": "https:\/\/github.com\/hacieda",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hacieda\/CVE-2025-32463",
"description": null,
"fork": false,
"created_at": "2025-08-27T18:58:34Z",
"updated_at": "2025-08-27T18:58:34Z",
"pushed_at": "2025-08-27T18:58:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1051020962,
"name": "CVE-2025-32463_PoC",
"full_name": "blackcat4347\/CVE-2025-32463_PoC",
"owner": {
"login": "blackcat4347",
"id": 89696744,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89696744?v=4",
"html_url": "https:\/\/github.com\/blackcat4347",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/blackcat4347\/CVE-2025-32463_PoC",
"description": null,
"fork": false,
"created_at": "2025-09-05T10:12:36Z",
"updated_at": "2025-09-05T11:24:54Z",
"pushed_at": "2025-09-05T11:24:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1060459956,
"name": "CVE-2025-32463_chwoot",
"full_name": "ashardev002\/CVE-2025-32463_chwoot",
"owner": {
"login": "ashardev002",
"id": 156189535,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156189535?v=4",
"html_url": "https:\/\/github.com\/ashardev002",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ashardev002\/CVE-2025-32463_chwoot",
"description": "🔍 Demonstrate the CVE-2025-32463 privilege-escalation flaw in sudo's chroot feature with this minimal, reproducible proof of concept environment.",
"fork": false,
"created_at": "2025-09-20T00:42:07Z",
"updated_at": "2025-12-01T17:06:28Z",
"pushed_at": "2025-12-01T17:06:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"chroot",
"chwoot",
"cybersecurity",
"docker",
"docker-image",
"eop",
"escalate-privilages",
"exploit",
"linux",
"lpe",
"poc",
"privilege-escalation",
"privilege-escalation-exploits",
"proof-of-concept",
"proof-of-work",
"scanner",
"sudo",
"vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1060480276,
"name": "CVE-2025-32463",
"full_name": "mihnasdsad\/CVE-2025-32463",
"owner": {
"login": "mihnasdsad",
"id": 216926226,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/216926226?v=4",
"html_url": "https:\/\/github.com\/mihnasdsad",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mihnasdsad\/CVE-2025-32463",
"description": null,
"fork": false,
"created_at": "2025-09-20T02:01:08Z",
"updated_at": "2025-12-01T17:06:35Z",
"pushed_at": "2025-12-01T17:06:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"chroot",
"cve",
"cve-2025-32463",
"cybersecurity",
"docker",
"eop",
"escalate-privilages",
"linux",
"poc",
"privesc",
"privilege-escalation-exploits",
"proof-of-concept",
"proof-of-work",
"security",
"sudo",
"sudo-privilege-escalation",
"ubuntu",
"vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1062957966,
"name": "CVE-2025-32463-Sudo-Chroot-Escape",
"full_name": "D3ltaFormation\/CVE-2025-32463-Sudo-Chroot-Escape",
"owner": {
"login": "D3ltaFormation",
"id": 232729796,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/232729796?v=4",
"html_url": "https:\/\/github.com\/D3ltaFormation",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/D3ltaFormation\/CVE-2025-32463-Sudo-Chroot-Escape",
"description": "This repository contains a Proof of Concept (PoC) for CVE-2025-32463, a vulnerability in sudo allowing a chroot escape to achieve local privilege escalation.",
"fork": false,
"created_at": "2025-09-24T01:17:27Z",
"updated_at": "2025-09-24T05:11:35Z",
"pushed_at": "2025-09-24T05:11:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1066776919,
"name": "CVE-2025-32463",
"full_name": "AC8999\/CVE-2025-32463",
"owner": {
"login": "AC8999",
"id": 207462763,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/207462763?v=4",
"html_url": "https:\/\/github.com\/AC8999",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/AC8999\/CVE-2025-32463",
"description": "A Python exploit for CVE-2025-32463, a critical local privilege escalation vulnerability in the Sudo binary on Linux systems. This flaw allows local users to obtain root access by exploiting the --chroot option, which incorrectly uses \/etc\/nsswitch.conf from a user-controlled directory.",
"fork": false,
"created_at": "2025-09-30T00:23:56Z",
"updated_at": "2025-09-30T00:36:15Z",
"pushed_at": "2025-09-30T00:36:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1067909853,
"name": "CVE-2025-32463",
"full_name": "onniio\/CVE-2025-32463",
"owner": {
"login": "onniio",
"id": 58563974,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58563974?v=4",
"html_url": "https:\/\/github.com\/onniio",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/onniio\/CVE-2025-32463",
"description": null,
"fork": false,
"created_at": "2025-10-01T15:07:07Z",
"updated_at": "2025-10-01T15:08:34Z",
"pushed_at": "2025-10-01T15:08:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1068340231,
"name": "CVE-2025-32463",
"full_name": "khoazero123\/CVE-2025-32463",
"owner": {
"login": "khoazero123",
"id": 2802354,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2802354?v=4",
"html_url": "https:\/\/github.com\/khoazero123",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/khoazero123\/CVE-2025-32463",
"description": "# CVE-2025-32463 Sudo EoP Exploit (PoC) with precompiled .so",
"fork": false,
"created_at": "2025-10-02T08:29:50Z",
"updated_at": "2025-10-02T08:30:38Z",
"pushed_at": "2025-07-14T10:07:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1071155881,
"name": "CVE-2025-32463",
"full_name": "r3dBust3r\/CVE-2025-32463",
"owner": {
"login": "r3dBust3r",
"id": 90137144,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90137144?v=4",
"html_url": "https:\/\/github.com\/r3dBust3r",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/r3dBust3r\/CVE-2025-32463",
"description": "This repository contains an exploit script for CVE-2025-32463, a local privilege escalation involving `chroot` behavior in affected `sudo` versions (1.9.14 through 1.9.17)",
"fork": false,
"created_at": "2025-10-07T00:17:59Z",
"updated_at": "2025-10-07T00:37:20Z",
"pushed_at": "2025-10-07T00:30:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1072559981,
"name": "CVE-2025-32463",
"full_name": "0x3c4dfa1\/CVE-2025-32463",
"owner": {
"login": "0x3c4dfa1",
"id": 88791702,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88791702?v=4",
"html_url": "https:\/\/github.com\/0x3c4dfa1",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0x3c4dfa1\/CVE-2025-32463",
"description": "sudo --chroot exploit",
"fork": false,
"created_at": "2025-10-08T22:30:12Z",
"updated_at": "2025-10-08T22:32:29Z",
"pushed_at": "2025-10-08T22:32:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1072719907,
"name": "CVE-2025-32463",
"full_name": "ricardomaia\/CVE-2025-32463",
"owner": {
"login": "ricardomaia",
"id": 1353811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1353811?v=4",
"html_url": "https:\/\/github.com\/ricardomaia",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ricardomaia\/CVE-2025-32463",
"description": "Enviroment and Nuclei template to test CVE-2025-32463",
"fork": false,
"created_at": "2025-10-09T05:53:15Z",
"updated_at": "2025-10-09T19:46:29Z",
"pushed_at": "2025-10-09T19:46:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1072857291,
"name": "CVE-2025-32463",
"full_name": "shazed-x\/CVE-2025-32463",
"owner": {
"login": "shazed-x",
"id": 101574072,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101574072?v=4",
"html_url": "https:\/\/github.com\/shazed-x",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/shazed-x\/CVE-2025-32463",
"description": "- Vulnerable: sudo 1.9.14, 1.9.15, 1.9.16, 1.9.17 - Patched in: sudo 1.9.17p1 and later - Legacy versions older than 1.9.14 are not affected, as they don't support the --chroot option.",
"fork": false,
"created_at": "2025-10-09T09:58:59Z",
"updated_at": "2025-10-09T10:07:45Z",
"pushed_at": "2025-10-09T10:07:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1074341401,
"name": "CVE-2025-32463_POC",
"full_name": "cybershaolin47\/CVE-2025-32463_POC",
"owner": {
"login": "cybershaolin47",
"id": 201147645,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/201147645?v=4",
"html_url": "https:\/\/github.com\/cybershaolin47",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cybershaolin47\/CVE-2025-32463_POC",
"description": null,
"fork": false,
"created_at": "2025-10-11T15:50:56Z",
"updated_at": "2025-10-11T15:55:25Z",
"pushed_at": "2025-10-11T15:52:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2025-32463",
"exploit",
"exploitdevelopment",
"hacking",
"penetration-testing",
"privesc",
"privilege-escalation",
"redteam"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1074625609,
"name": "CVE-2025-32463",
"full_name": "cyberajju\/CVE-2025-32463",
"owner": {
"login": "cyberajju",
"id": 120666627,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120666627?v=4",
"html_url": "https:\/\/github.com\/cyberajju",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cyberajju\/CVE-2025-32463",
"description": "Privilege escalation to root using sudo chroot, NO NEED for gcc installed.",
"fork": false,
"created_at": "2025-10-12T06:42:58Z",
"updated_at": "2025-10-12T06:45:18Z",
"pushed_at": "2025-10-12T06:45:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1078353644,
"name": "sudo-chroot",
"full_name": "dr4x-c0d3r\/sudo-chroot",
"owner": {
"login": "dr4x-c0d3r",
"id": 210149154,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/210149154?v=4",
"html_url": "https:\/\/github.com\/dr4x-c0d3r",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dr4x-c0d3r\/sudo-chroot",
"description": "Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Python",
"fork": false,
"created_at": "2025-10-17T15:42:57Z",
"updated_at": "2025-11-01T19:51:25Z",
"pushed_at": "2025-10-17T16:02:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2025-32463",
"ethical-hacking",
"ethical-hacking-tools",
"exploit",
"hack",
"hacking",
"hacking-tools",
"kali-linux",
"linux",
"linux-kernel",
"privelage-escalation",
"sudo",
"sudo-chroot",
"sudo-exploitation",
"ubuntu",
"vulnerabilities"
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1078420776,
"name": "sudo-chroot",
"full_name": "dr4xp\/sudo-chroot",
"owner": {
"login": "dr4xp",
"id": 231748105,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/231748105?v=4",
"html_url": "https:\/\/github.com\/dr4xp",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dr4xp\/sudo-chroot",
"description": "Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Python",
"fork": false,
"created_at": "2025-10-17T17:50:49Z",
"updated_at": "2025-10-24T01:47:25Z",
"pushed_at": "2025-10-17T17:52:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2025-32463",
"ethical-hacking",
"ethical-hacking-tools",
"exploit",
"hacking",
"hacking-tools",
"kali-linux",
"kernel-exploit",
"linux",
"linux-kernel",
"poc",
"privilege-escalation",
"python",
"python3",
"sudo",
"sudo-chroot",
"sudo-exploitation",
"ubuntu",
"vulnerabilities"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1079295432,
"name": "CVE-2025-32463",
"full_name": "robbin0919\/CVE-2025-32463",
"owner": {
"login": "robbin0919",
"id": 66932401,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66932401?v=4",
"html_url": "https:\/\/github.com\/robbin0919",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/robbin0919\/CVE-2025-32463",
"description": null,
"fork": false,
"created_at": "2025-10-19T14:22:02Z",
"updated_at": "2025-10-26T04:34:53Z",
"pushed_at": "2025-10-26T04:34:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1083377786,
"name": "CVE-2025-32463",
"full_name": "DensuLabs\/CVE-2025-32463",
"owner": {
"login": "DensuLabs",
"id": 21319147,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21319147?v=4",
"html_url": "https:\/\/github.com\/DensuLabs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/DensuLabs\/CVE-2025-32463",
"description": "CVE202532463",
"fork": false,
"created_at": "2025-10-25T22:18:35Z",
"updated_at": "2025-10-25T22:18:39Z",
"pushed_at": "2025-10-25T22:18:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1086312827,
"name": "CVE-2025-32463",
"full_name": "muhammedkayag\/CVE-2025-32463",
"owner": {
"login": "muhammedkayag",
"id": 153989073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153989073?v=4",
"html_url": "https:\/\/github.com\/muhammedkayag",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/muhammedkayag\/CVE-2025-32463",
"description": "Technical examination of CVE-2025-32463 by Muhammed Kaya. ",
"fork": false,
"created_at": "2025-10-30T08:47:49Z",
"updated_at": "2025-10-30T08:56:50Z",
"pushed_at": "2025-10-30T08:56:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1088755885,
"name": "CVE-2025-32463",
"full_name": "NewComrade12211\/CVE-2025-32463",
"owner": {
"login": "NewComrade12211",
"id": 178562912,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/178562912?v=4",
"html_url": "https:\/\/github.com\/NewComrade12211",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/NewComrade12211\/CVE-2025-32463",
"description": "exploit",
"fork": false,
"created_at": "2025-11-03T12:15:02Z",
"updated_at": "2025-11-05T11:18:53Z",
"pushed_at": "2025-11-03T12:17:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1093200691,
"name": "CVE-2025-32463",
"full_name": "Ghstxz\/CVE-2025-32463",
"owner": {
"login": "Ghstxz",
"id": 242834099,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/242834099?v=4",
"html_url": "https:\/\/github.com\/Ghstxz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Ghstxz\/CVE-2025-32463",
"description": null,
"fork": false,
"created_at": "2025-11-10T03:40:18Z",
"updated_at": "2025-11-10T03:40:18Z",
"pushed_at": "2025-11-10T03:40:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1097383354,
"name": "CVE-2025-32463-Sudo-Privilege-Escalation",
"full_name": "ankitpandey383\/CVE-2025-32463-Sudo-Privilege-Escalation",
"owner": {
"login": "ankitpandey383",
"id": 238631250,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/238631250?v=4",
"html_url": "https:\/\/github.com\/ankitpandey383",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ankitpandey383\/CVE-2025-32463-Sudo-Privilege-Escalation",
"description": "Practical security research project exploiting CVE-2025-32463 to gain root access on a vulnerable sudo version. Includes write-up, PoC, and mitigation steps.",
"fork": false,
"created_at": "2025-11-16T04:13:54Z",
"updated_at": "2025-11-16T05:14:05Z",
"pushed_at": "2025-11-17T02:13:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1105368645,
"name": "CVE-2025-32463",
"full_name": "justjoeyking\/CVE-2025-32463",
"owner": {
"login": "justjoeyking",
"id": 66114238,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66114238?v=4",
"html_url": "https:\/\/github.com\/justjoeyking",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/justjoeyking\/CVE-2025-32463",
"description": "Chroot Privilege Escalation",
"fork": false,
"created_at": "2025-11-27T14:04:03Z",
"updated_at": "2025-11-27T14:22:11Z",
"pushed_at": "2025-11-27T14:22:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]