linux-exploit-suggester-2
Exploit finder
Tools to help find and retrieve Linux exploit code from Exploit DB
Next-Generation Linux Kernel Exploit Suggester
2k stars
37 watching
298 forks
Language: Perl
last commit: almost 2 years ago
Linked from 2 awesome lists
Related projects:
Repository | Description | Stars |
---|---|---|
intelisecurelabs/linux_exploit_suggester | Provides a list of possible exploits based on the Linux operating system release version. | 1,779 |
1n3/findsploit | A simple bash script to quickly search local and online exploit databases. | 1,644 |
rfunix/pompem | Automates searches for exploits and vulnerabilities across multiple databases | 984 |
reider-roque/linpostexp | Tools for analyzing and exploiting vulnerabilities in Linux systems | 176 |
kibercthulhu/gdb-peda-cheatsheet | A collection of tips and tricks for using GDB-PEDA in exploit development | 16 |
lazenca/kernel-exploit-tech | A tutorial and resource for learning Linux kernel exploitation techniques | 262 |
vulnerscom/getsploit | A tool for searching and downloading exploits from various sources. | 1,726 |
billy-ellis/exploit-challenges | A collection of vulnerable ARM binaries designed to help practitioners develop exploit development skills | 898 |
quentinhardy/scriptsandexploits | Exploits a known vulnerability in Oracle WebLogic to execute arbitrary code | 142 |
belane/linux-soft-exploit-suggester | A script to identify vulnerabilities in software packages on Linux systems | 222 |
pimps/jndi-exploit-kit | An exploit kit designed to start an HTTP Server, RMI Server and LDAP Server to exploit Java web apps vulnerable to JNDI Injection | 903 |
ngalongc/autolocalprivilegeescalation | Automates download and compilation of Linux kernel exploits from exploitdb | 486 |
xct/ropstar | Automatically generates exploits for simple Linux buffer overflow challenges. | 317 |
xairy/kernel-exploits | A collection of proof-of-concept exploits for vulnerabilities in the Linux kernel | 1,450 |
spencerdodd/kernelpop | Automated framework for discovering and exploiting kernel vulnerabilities on Linux and macOS. | 687 |