π€ RamiGPT: AI‑Driven Autonomous Privilege Escalation (Deep Dive — 2025)
Author: CyberHawk
Published: August 2025
π What Is RamiGPT?
RamiGPT is an AI-powered offensive agent by M507 that autonomously finds and exploits privilege escalation vulnerabilities using OpenAI reasoning and tools like LinPEAS, BeRoot, and PwnTools. It has consistently rooted vulnerable systems in under 15 seconds in real-world VulnHub CTF challenges (Security Aid).
⏳ Real Machine Performance Metrics
VulnHub Target | Time to Root |
---|---|
Escalate Linux 1 | ~12.83 seconds |
Venom: 1 | ~9.67 seconds |
DC: 2 | ~9.66 seconds |
digitalworld.local → TORMENT | ~9.73 seconds |
hacksudo: L.P.E. | ~9.85 seconds |
serial: 1 | ~9.62 seconds |
(Text data taken from timing table in the repo) (GitHub, Security Aid) |
π§ Architecture & Workflow Overview
-
User Input → Target connection via SSH or IP input.
-
Enumeration → Executes shell enumeration (LinPEAS for Linux, BeRoot for Windows).
-
AI Reasoning → Sends findings to OpenAI, receives recommended exploit paths.
-
Automation → Uses PwnTools scripts to carry out escalation steps.
-
Detection → Observes shell output or UID prompt to confirm root success via
root_detection.py
. -
Logging → Records elapsed times for each task via
setup_logger.py
(GitHub, security-science.com).
π Installing & Running RamiGPT
π 1. OpenAI API Key & Environment Setup
git clone https://github.com/M507/RamiGPT.git
cd RamiGPT
cp .env.example .env
# Open .env and insert your OpenAI API key into OPENAI_API_KEY=
π³ 2. Environment Execution Methods
Option A: Run via Docker
docker compose up -d
# Access at https://127.0.0.1:5000
Option B: Run Locally with Python
chmod +x generate_certs.sh
./generate_certs.sh
pip install -r requirements.txt
python3 app.py
Visit https://localhost:5000
in your browser (GitHub).
⛏️ How RamiGPT Works Under the Hood
π Enumeration Modules
-
LinPEAS: Finds SUID binaries, weak permissions, sudo configs, cron jobs.
-
BeRoot: Windows enumeration for misconfigurations like AlwaysInstallElevated or unquoted service paths (Undercode Testing).
π§ OpenAI-Guided Reasoning
The agent transforms enumeration output into structured prompt text, submits to OpenAI, interprets the AI-generated strategy, and validates proposed paths programmatically.
π₯ Exploitation via PwnTools
Once a path is confirmed valid, exploits run automatically (sudo abuse, cron payload execution, credential extraction). The logic flow continues until root is achieved—or no valid escalation found.
π️ Detailed Example Flow
-
Connect to VM (e.g., Escalate Linux 1).
-
RamiGPT runs LinPEAS, returns findings like "rudimentary user's sudo on
/usr/bin/find
" or "weak password in.bash_history
". -
LLM suggests
echo 'exploit.sh' | sudo tee /dev/sh
or similar. -
PwnTools executes shell logic to escalate.
-
Root is detected and reported in post-run logs and interface.
π Ethical & Security Considerations
-
Authorized Use Only: Intended for authorized testing (e.g., lab, pen test engagements). Repository includes explicit legal disclaimer (security-science.com, GitHub).
-
Avoid misuse: Unauthorized usage may violate laws like the CFAA.
-
Monitoring Recommendations:
-
Audit commands (
linpeas
,sudo -l
, binary operations) -
Monitor behavioral anomalies
-
Implement time-based privilege escalation (PAM policies)
-
Modern PAM and threat platforms monitor suspicious automation patterns and log credential access attempts for AI-style tooling (░ ' ░).
π§° When to Use RamiGPT
Ideal for:
-
Red team training labs
-
CTF practice sessions (VulnHub environments)
-
Demonstrating AI-assisted escalation in presentations or threat models
Avoid misuse in production or uncontrolled environments.
π Human vs AI Escalation
Traditional manual escalation requires step-by-step commands:
sudo -l
find / -perm -u=s -type f
grep -R "password" -i /home
RamiGPT compresses this entire logic flow into an autonomous reasoning loop—accelerating escalation from judgment to execution in seconds (Cyber Security News, security-science.com).
π‘ Defensive Measures Against AI Escalation Tools
Defensive Strategy | Network/EDR Control |
---|---|
Alert on automated enumeration | Monitor unusual LinPEAS/BeRoot use |
Limit sudo abuse | Enforce granular sudo policies |
PAM time-bound access | Prevent automated repeated escalation |
AI anomaly detection | Identify repeated AI-sourced commands |
Event logging | Capture shells, PwnTools calls |
✅ In Summary
RamiGPT is a milestone in AI-augmented red teaming—it merges automated enumeration, LLM reasoning, and scripted exploitation into a powerful root escalation agent. It mimics expert attacker behavior at superhuman speed, highlighting both AI’s utility and its potential danger in attackers’ hands.
By exploring tools like RamiGPT in controlled, ethically authorized environments, red teams and defenders alike can prepare for AI-driven offensive techniques becoming mainstream.
Comments
Post a Comment