For more information visit www.rebootuser.com. Note: Export functionality is currently in the experimental stage. General usage: version 0.982. Example: ./LinEnum.sh -s -k keyword -r report -e /tmp/ -t. OPTIONS: -k Enter keyword. -e Enter export location. -t Include thorough (lengthy) tests. -s Supply current user password to check sudo perms (INSECURE). -r Enter report name. -h Displays this help text. Running with no options = limited scans/no output file. -e Requires the user enters an output location i.e. /tmp/export. If this location does not exist, it will be created. -r Requires the user to enter a report name. The report (.txt file) will be saved to the current working directory. -t Performs thorough (slow) tests. Without this switch default 'quick' scans are performed. -s Use the current user with supplied password to check for sudo permissions - note this is insecure and only really for CTF use! -k An optional switch for which the user can search for a single keyword within many files (documented below). See CHANGELOG.md for further details. High-level summary of the checks/tasks performed by LinEnum: Kernel and distribution release details. System Information: Hostname. Netwo
Covenant is a .NET C2 framework for red teamers, facilitating collaborative and efficient management of red team operations.
Metta is an information security preparedness tool for adversarial simulation.
A C2 front flow control tool designed to evade detection by Blue Teams, AVs, and EDRs.
Performs network mapping of attack surfaces and external asset discovery using open source information gathering and active reconnaissance techniques.
Exploiting WordPress With Metasploit, containing 45 modules for exploits and auxiliaries.
A set of commands for exploit developers and reverse-engineers to enhance GDB functionality.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.