Linux Exploit Suggester is a command-line tool that audits Linux kernels for exposure to publicly known privilege escalation exploits and verifies kernel hardening settings.
Linux privilege escalation auditing tool
This tool is primarily used by security professionals and system administrators to quickly assess the vulnerability of a Linux system's kernel to known exploits and to evaluate the effectiveness of kernel hardening measures. It helps identify potential privilege escalation vectors and security misconfigurations to prioritize remediation efforts.
The tool relies on heuristic methods and publicly available exploit data, so some results may require manual verification. Running the tool requires appropriate permissions to access kernel information. For best results, ensure the kernel version and distribution details are accurately detected. Use the provided URLs to review exploit details and understand prerequisites or conditions for successful exploitation.
Download the script using wget: wget https://raw.githubusercontent.com/mzet-/linux-exploit-suggester/master/linux-exploit-suggester.sh -O les.sh
Make the script executable if needed: chmod +x les.sh
Run the script directly on the target Linux system
./linux-exploit-suggester.sh
Runs the tool to assess kernel exposure to publicly known Linux privilege escalation exploits.
./linux-exploit-suggester.sh --checksec
Checks the state of kernel hardening security measures including compile-time and runtime settings.