Sunday, April 13, 2025
HomeExploitation ToolsLinux Exploit Suggester - A Kali Linux Tool to Find the...

Linux Exploit Suggester – A Kali Linux Tool to Find the Linux OS Kernel Exploits

Published on

SIEM as a Service

Follow Us on Google News

According to Kali Tool list, Linux Exploit Suggester provide just a simple script to keep track of vulnerabilities and suggest possible exploits to gain ‘root‘ on a legitimate penetration test or governing examining body.

This Script will perform by “uname ” -r to find the Linux OS Released Kernel Version.

Additionally possible to provide ‘-k’ flag to manually enter the Kernel Version/Operating System Release Version.

- Advertisement - Google News

Linux Exploit Suggester Tool 

Step 1:

If you don’t Find Linux Exploit Suggester by Default in Kali Linux, from then Download the clone Repositorfrom Github

Once you Download the tool then Extract the Zip and Install itLinux Exploit Suggester -simple script to keep track of vulnerabilities

Step 2:

To find the Linux Kernal Version user uname -v

Linux Exploit Suggester -simple script to keep track of vulnerabilities

Step 3:

Here we could see the possible Exploit of lInux kernal Verson 2.6.28 .

Use ” Perl ./Linux_Exploit_suggester.pl -k

Here K Used for Manually enter the Version of OS Kernal.

Here 2.2.28 Linux Kernal version Have some Vulnerabilities to Exploit

Ex : CVE-2010-4347 – American-Sign-Language

Also Read  XSSer automated framework to detect, exploit and report XSS vulnerabilities

Linux Exploit Suggester -simple script to keep track of vulnerabilities

Here we tested the Kernel Version 2.6.37.This tool has been discovered some Possible Exploit.

Linux Exploit Suggester a simple script to keep track of vulnerabilities

Here we can see some other Exploit for the kernal version 2.6.39

Linux Exploit Suggester -simple script to keep track of vulnerabilities

By Using same Method  you can Keep searching the Exploits for another Versions.

Author : Aidy

Also Read Exploitation Framework for Embedded devices – RouterSploit

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Cable: Powerful Post-Exploitation Toolkit for Active Directory Attacks

Cybersecurity researchers are raising alarms about Cable, a potent open-source post-exploitation toolkit designed to exploit...

Windows 11 BitLocker Bypassed to Extract Encryption Keys

An attacker with physical access can abruptly restart the device and dump RAM, as...

ConvoC2 – A Red Teamers Tool To Execute Commands on Hacked Hosts Via Microsoft Teams

A stealthy Command-and-Control (C2) infrastructure Red Team tool named ConvoC2 showcases how cyber attackers...