Linux Exploit Suggester (LES) is a privilege escalation auditing tool that analyzes Linux kernels and Linux-based systems for security vulnerabilities. The tool uses heuristic methods to assess kernel exposure to publicly known Linux kernel exploits. LES provides detailed vulnerability information including CVE identifiers, exposure likelihood assessments, and information about affected Linux distributions. The tool assists security professionals in identifying potential privilege escalation vectors by examining the target system's kernel version and configuration against known exploit databases. The tool operates by comparing system characteristics against a database of known Linux kernel vulnerabilities and exploits. It generates reports that help users understand which publicly available exploits may be effective against the analyzed system, supporting both defensive security assessments and penetration testing activities.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A collection of Python scripts for password spraying attacks against Lync/S4B & OWA, featuring Atomizer, Vaporizer, Aerosol, and Spindrift tools.
A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.
AHHHZURE is an automated deployment script that creates vulnerable Azure cloud lab environments for offensive security training and cloud penetration testing practice.
SharpShares efficiently enumerates and maps network shares and resolves names within a domain.
Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.
PyBOF is a Python library that enables in-memory loading and execution of Beacon Object Files (BOFs) with support for argument passing and function targeting.
SauronEye helps in identifying files containing sensitive data such as passwords through targeted directory searches.
SharpEDRChecker scans system components to detect security products and tools.