Linux Exploit Suggester 2 Logo

Linux Exploit Suggester 2

0
Free
Visit Website

Next-generation exploit suggester based on Linux_Exploit_Suggester. Key Improvements Include: More exploits! Option to download exploit code directly from Exploit DB. Accurate wildcard matching for expanded scope of searchable exploits. Output colorization for easy viewing. Extremely useful for quickly finding privilege escalation vulnerabilities in on-site and exam environments. When run without arguments, the script performs a 'uname -r' to grab the Linux operating system release version and returns a list of possible exploits with links to CVEs and applicable exploit POCs. Keep in mind that a patched/back-ported patch may fool this script.

FEATURES

ALTERNATIVES

An AI-powered Google Dorking tool that helps create effective search queries to uncover sensitive information on the internet.

A framework for building code injection vulnerability testbeds

Platform for users to test cybersecurity skills by exploiting vulnerabilities.

Patch-level verification tool for bundler to check for vulnerable gems and insecure sources.

A cybersecurity platform that offers vulnerability scanning, Windows Defender and 3rd party AV management, and MFA compliance reporting, among other features.

An open-source attack surface management platform for identifying and managing vulnerabilities

A fully customizable, offensive security reporting solution for pentesters, red teamers, and other security professionals.

Web-application vulnerability scanner with extensive coverage of security testing modules.

PINNED