Linux Soft Exploit Suggester Logo

Linux Soft Exploit Suggester

0
Free
Visit Website

Script to find exploits for all vulnerable software on the system, targeting software packages rather than just kernel vulnerabilities. It uses the exploit database to assess the security of packages and search for exploits to help with privilege escalation. Usage: - Download: wget https://raw.githubusercontent.com/belane/linux-soft-exploit-suggester/master/linux-soft-exploit-suggester.py - Basic use: Downloads the exploit database, generates a list of packages, and searches for exploits: python linux-soft-exploit-suggester.py - Run from a list of packages from another system if you can't run from the target: - Debian/Ubuntu: dpkg -l > package_list - RedHat/CentOS: rpm -qa > package_list - Update exploit database: python linux-soft-exploit-suggester.py --update - Look for exploits for running processes, setuid binaries, and Linux capabilities: python linux-soft-exploit-suggester.py --juicy - Filter exploits by local exploit type and minor versions: python linux-soft-exploit-suggester.py --level 2 --type local Example Output: python linux-soft-exploit-suggester.py --file packages --db files_exploits.csv

FEATURES

ALTERNATIVES

A presentation about the OWASP Top 10, a list of the most critical security risks to web applications.

A vulnerability management tool for macOS that monitors and detects vulnerabilities in over 100 apps.

A comprehensive database of exploits and vulnerabilities for researchers and professionals

WordPress security scanner for identifying vulnerabilities in WordPress websites.

Web-application vulnerability scanner with extensive coverage of security testing modules.

FullHunt is a next-generation attack surface security platform that enables companies to discover, monitor, and secure their external attack surfaces.

Weekly security newsletter with advisories from major software vendors

Pac-resolver, a popular NPM package with 3 million weekly downloads, has a severe remote code execution flaw.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved