Linux Exploit Suggester 2

Linux Exploit Suggester 2

#Threat Defense#Vulnerability Management

iOS application for testing iOS penetration testing skills in a legal environment.

Visit Website

Next-Generation Exploit Suggester Based on Linux_Exploit_Suggester

The next-generation exploit suggester is based on Linux_Exploit_Suggester. Key improvements include: an increased number of exploits, the option to download exploit code directly from Exploit DB, accurate wildcard matching for a broader range of searchable exploits, and output colorization for easier viewing. This tool is extremely useful for quickly identifying privilege escalation vulnerabilities in both on-site and exam environments. When executed without any arguments, the script runs a 'uname -r' command to retrieve the Linux operating system release version and then provides a list of potential exploits along with links to CVEs and relevant exploit POCs. Please remember that a patched or back-ported patch may mislead this script.