Enumy:-- Linux post-exploitation privilege escalation
by ziki - October 19, 2020 at 09:46 AM
#1
[Image: 119638902_1594731864030865_7191173489675...e=5FB36F85]




Quick Scan:-
1. SUID/GUID Scans
2. File Capabilities scan
3. Interesting Files Scan
4. Coredump Scan
5. Breakout Binary Scan
6. Sysctl Parameter Hardening
7. Living Off The Land scan
Full Scan:-
1. Quick Scan
2. Dynamic Shared Object Injection Scan
Download Link:-
https://github.com/luke-goddard/enumy
Reply
#2
Thanks for sharing.
It will better if support cve, kernel vulnerability check
Reply

Possibly Related Threads…
Thread Author Replies Views Last Post
Suicide Linux Rynzler 20 4,151 November 25, 2020 at 01:12 AM
Last Post: eyeholesmanc137
Search for backdoors and rootkits on your Linux. ch0colate 8 385 November 24, 2020 at 06:33 AM
Last Post: linuxpirate
What is the best Linux distro for privacy and general use? xversion1 28 3,080 November 18, 2020 at 10:57 PM
Last Post: brizz

 Users browsing this thread: 1 Guest(s)