
Top picks: Linux Exploit Suggester (LES), SUDO_KILLER, Ironwood Cyber Enlight — plus 45 more compared.
Vulnerability ManagementLinux Exploit Suggester 2 is a free Penetration Testing tool. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to Linux Exploit Suggester 2, including their key features and shared capabilities.
A Linux privilege escalation auditing tool that identifies potential kernel vulnerabilities and suggests applicable exploits based on system analysis.
Shares 3 capabilities with Linux Exploit Suggester 2: Linux, CVE, Privilege Escalation
A tool for privilege escalation within Linux environments by targeting vulnerabilities in SUDO usage.
Autonomous pentesting platform that discovers, exploits & maps attack paths.
BloodHound is a Javascript web application that uses graph theory to analyze Active Directory and Azure environments, revealing hidden relationships and potential attack paths through visual mapping.
A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.
Linux Exploit Suggester; suggests possible exploits based on the Linux operating system release number.
PowerUp aims to be a clearinghouse of common Windows privilege escalation vectors that rely on misconfigurations.
A script to enumerate Google Storage buckets and determine access and privilege escalation
A Linux privilege escalation auditing tool that identifies potential kernel vulnerabilities and suggests applicable exploits based on system analysis.
A tool for privilege escalation within Linux environments by targeting vulnerabilities in SUDO usage.
Autonomous pentesting platform that discovers, exploits & maps attack paths.
BloodHound is a Javascript web application that uses graph theory to analyze Active Directory and Azure environments, revealing hidden relationships and potential attack paths through visual mapping.
A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.
Linux Exploit Suggester; suggests possible exploits based on the Linux operating system release number.
PowerUp aims to be a clearinghouse of common Windows privilege escalation vectors that rely on misconfigurations.
A script to enumerate Google Storage buckets and determine access and privilege escalation
A collection of precompiled Windows exploits for privilege escalation.
Script to find exploits for vulnerable software packages on Linux systems using an exploit database.
Principal Mapper is a Python tool that models AWS IAM configurations as directed graphs to identify privilege escalation risks and alternative attack paths in AWS environments.
A Python script that performs security testing attacks against AWS Cognito services including account creation, user enumeration, and privilege escalation vulnerabilities.
LinEnum is a tool for Linux enumeration that provides detailed system information and performs various checks and tasks.
A comprehensive repository of payloads and bypass techniques for web application security testing and penetration testing across multiple platforms and attack vectors.
A security assessment tool that identifies AWS IAM permissions by systematically testing API calls to determine the actual scope of access granted to specific credentials.
Pacu is an open-source AWS exploitation framework designed for offensive security testing against cloud environments through modular attack capabilities.
GNU/Linux Wireless distribution for security testing with XFCE desktop environment.
Scripts to automate the process of enumerating a Linux system through a Local File Inclusion (LFI) vulnerability.
A web application security testing platform that combines manual and automated testing tools for conducting comprehensive security assessments and penetration testing.
AI-powered autonomous penetration testing platform with multi-agent system
AI-powered automated penetration testing platform for vulnerability discovery
AI-powered automated penetration testing platform for web apps, APIs & GraphQL
Human-guided continuous pentesting platform with attack surface management
AI-powered automated pen testing & continuous red teaming platform
Pentest management platform for reporting, project mgmt & client collaboration
Pentest reporting & exposure mgmt platform for vulnerability remediation
Automated pentesting for web apps & APIs with continuous vulnerability scanning
Penetration testing software for simulating attacks and validating vulnerabilities
Automated internal network penetration testing and security validation platform
Continuous pentesting service monitoring web apps & APIs for code changes
AI-powered automated penetration testing platform for web apps and networks
AI-powered automated penetration testing platform for on-demand security audits
AI-powered autonomous pentesting platform for continuous security validation
Modular offensive security platform for continuous monitoring and testing
AI-native multi-agent pentesting engine for autonomous vulnerability discovery
AI-driven autonomous pentesting platform for continuous vulnerability discovery
Continuous automated pentesting platform for ongoing security assessment
Autonomous AI system for continuous penetration testing and exploit validation
Cloud-based penetration testing platform for threat mgmt & remediation
Managed continuous penetration testing service for internal & external networks
Autonomous penetration testing platform identifying attack paths & vulnerabilities
Automated network penetration testing tool for internal and external attacks
Continuous pentesting platform with autonomous AI agents for web apps and APIs
AI-powered continuous pentesting platform with agentic automation
AI-powered pentest & VMDR platform for vulnerability scanning & management
Common questions security professionals ask when evaluating alternatives and competitors to Linux Exploit Suggester 2.
The most popular alternatives to Linux Exploit Suggester 2 include Linux Exploit Suggester (LES), SUDO_KILLER, Ironwood Cyber Enlight, BloodHound, and ExploitDB. These Penetration Testing tools offer similar capabilities and are frequently compared by security professionals evaluating their options.