Next-generation exploit suggester based on Linux_Exploit_Suggester. Key Improvements Include: More exploits! Option to download exploit code directly from Exploit DB. Accurate wildcard matching for expanded scope of searchable exploits. Output colorization for easy viewing. Extremely useful for quickly finding privilege escalation vulnerabilities in on-site and exam environments. When run without arguments, the script performs a 'uname -r' to grab the Linux operating system release version and returns a list of possible exploits with links to CVEs and applicable exploit POCs. Keep in mind that a patched/back-ported patch may fool this script.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A centralized vulnerability lifecycle management platform that tracks security issues from discovery to closure with real-time status updates.
A script that checks for common best-practices around deploying Docker containers in production.
An open-source attack surface management platform for identifying and managing vulnerabilities
A collection of Ansible roles for hardening various systems and services
A runtime threat management and attack path enumeration tool for cloud-native environments
Web inventory tool that captures screenshots of webpages and includes additional features for enhanced usability.
A hosted web application security testing tool that enables security researchers to register, activate their accounts, and scan web applications for vulnerabilities.
An application security platform that aggregates, prioritizes and contextualizes vulnerabilities from multiple security scanners and sources to help manage application and cloud security risks.
A Java based HTTP/HTTPS proxy for assessing web application vulnerability with various useful features.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.