Next-generation exploit suggester based on Linux_Exploit_Suggester
Key Improvements Include:
- More exploits!
- Option to download exploit code directly from Exploit DB
- Accurate wildcard matching. This expands the scope of searchable exploits.
- Output colorization for easy viewing.
- And more to come!
This script is extremely useful for quickly finding privilege escalation vulnerabilities both in on-site and exam environments.
When run without arguments, the script performs a 'uname -r' to grab the Linux operating system release version, and returns a list of possible exploits. Links to CVEs and applicable exploit POCs are included. Keep in mind that a patched/back-ported patch may fool this script.
$ ./linux-exploit-suggester-2.pl
Local Kernel: 4.4.0
Searching among 73 exploits...
Possible Exploits
[1] af_packet
CVE-2016-8655
Source: http://www.exploit-db.com/exploits/40871
[2] dirty_cow
CVE-2016-5195
Source: http://www.exploit-db.com/exploits/40616
[3] exploit_x
CVE-2018-14665
Source: http://www.exploit-db.com/exploits/45697
[4] get_rekt
CVE-2017-16695
Source: http://www.exploit-db.com/exploits/45010
Use the -k flag to manually enter a wildcard for the kernel/operating system release version.
$ ./linux-exploit-suggester-2.pl -k 3
Use the -d flag to open a download menu to retrieve exploit code directly from Exploit DB. You can either download all exploits or select them individually by number.
$ ./linux-exploit-suggester-2.pl -d
Exploit Download
(Download all: 'a' / Individually: '2,4,5' / Exit: ^c)
Select exploits to download: a
Downloading https://www.exploit-db.com/raw/40871 -> exploit_af_packet
Downloading https://www.exploit-db.com/raw/40616 -> exploit_dirty_cow
Downloading https://www.exploit-db.com/raw/45697 -> exploit_exploit_x
Downloading https://www.exploit-db.com/raw/45010 -> exploit_get_rekt
Use the -h flag to display the help menu
This project is in active development. Feel free to suggest a new feature or open a pull request!