Linux Exploit Suggester 2 ========================= Next-generation exploit suggester based on [Linux_Exploit_Suggester](https://github.com/PenturaLabs/Linux_Exploit_Suggester) Key Improvements Include: * More exploits! (Last updated: March 27, 2019) * Option to download exploit code directly from Exploit DB * Accurate wildcard matching. This expands the scope of searchable exploits. * Output colorization for easy viewing. * And more to come! This script is extremely useful for quickly finding privilege escalation vulnerabilities both in on-site and exam environments. Usage ============== When run without arguments, the script performs a 'uname -r' to grab the Linux operating system release version, and returns a list of possible exploits. Links to CVEs and applicable exploit POCs are included. Keep in mind that a patched/back-ported patch may fool this script. ``` $ ./linux-exploit-suggester.pl Local Kernel: 4.4.0 Searching among 73 exploits... Possible Exploits [1] af_packet CVE-2016-8655 Source: http://www.exploit-db.com/exploits/40871 [2] dirty_cow CVE-2016-5195 Source: http://www.exploit-db.com/exploits/40616 [3] exploit_x CVE-2018-14665 Source: http://www.exploit-db.com/exploits/45697 [4] get_rekt CVE-2017-16695 Source: http://www.exploit-db.com/exploits/45010 ``` Use the **-k** flag to manually enter a wildcard for the kernel/operating system release version. ``` $ ./linux-exploit-suggester.pl -k 3 ``` Use the **-d** flag to open a download menu to retrieve exploit code directly from Exploit DB. You can either download all exploits or select them individually by number. ``` $ ./linux-exploit-suggester.pl -d Exploit Download (Download all: 'a' / Individually: '2,4,5' / Exit: ^c) Select exploits to download: a Downloading https://www.exploit-db.com/raw/40871 -> exploit_af_packet Downloading https://www.exploit-db.com/raw/40616 -> exploit_dirty_cow Downloading https://www.exploit-db.com/raw/45697 -> exploit_exploit_x Downloading https://www.exploit-db.com/raw/45010 -> exploit_get_rekt ``` Use the **-h** flag to display the help menu Contributing ============ This project is in active development. Feel free to suggest a new feature or open a pull request!