Linux_Exploit_Suggester

Exploit suggestions

Provides a list of possible exploits based on the Linux operating system release version.

Linux Exploit Suggester; based on operating system release number

GitHub

2k stars
129 watching
407 forks
Language: Perl
last commit: over 10 years ago
Linked from 3 awesome lists


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
jondonas/linux-exploit-suggester-2 Tools to help find and retrieve Linux exploit code from Exploit DB 1,858
belane/linux-soft-exploit-suggester A script to identify vulnerabilities in software packages on Linux systems 222
cryptogenic/exploit-writeups A collection of technical writeups on kernel exploits and webkit vulnerabilities for various platforms 749
kibercthulhu/gdb-peda-cheatsheet A collection of tips and tricks for using GDB-PEDA in exploit development 16
reider-roque/linpostexp Tools for analyzing and exploiting vulnerabilities in Linux systems 176
rfunix/pompem Automates searches for exploits and vulnerabilities across multiple databases 984
billy-ellis/exploit-challenges A collection of vulnerable ARM binaries designed to help practitioners develop exploit development skills 898
vulnreproduction/linuxflaw Records reproductions of Linux vulnerabilities in various virtual machines. 399
xairy/kernel-exploits A collection of proof-of-concept exploits for vulnerabilities in the Linux kernel 1,450
spencerdodd/kernelpop Automated framework for discovering and exploiting kernel vulnerabilities on Linux and macOS. 687
bfilar/malware_rl Enabling research into malware bypass using reinforcement learning environments 102
fox-it/aclpwn.py Exploits vulnerabilities in Active Directory due to misconfigured ACLs using Python and BloodHound 702
rhinosecuritylabs/security-research Exploits and security research written by a team of experts 1,059
christhecoolhut/firmware_slap Analyzes firmware vulnerabilities using concolic analysis and function clustering 470
nccgroup/exploit_mitigations A knowledge base documenting exploit mitigations across various operating systems and software 874