<div style="margin:20px 0 0 200px"> To view the site, enable JavaScript by changing your browser options, then <a href="">Try Again</a>.</div>

PE Linux - Linux Privilege Escalation Tool

PE Linux - Linux Privilege Escalation Tool
  • Getting Started
  • System Information Gatherer
  • Kernel Information Gatherer
  • Checking Development environments on the system (Escaping Restricted Shells)
  • Extract PATH & environment Information
  • Check Kernel if Vulnerable To Dirty cow Exploit
  • Password Collector
  • Log Analyzer For interesting Information
  • Check Password Policy
  • Database Password Collector
  • Check If SSH Are Allowed With Root
  • Checking For interesting Root,Home,Var Directory Files
  • RSA Key's Collector
  • Command History Analyzer
  • Users Enumeration (Root - Sudo - UID List - GID List)
  • Cron Jobs Enumeration (Permissions - Own Cron - Cron Content - Writable Cron)
  • Network Information Lookup (TCP Connections - ARP - Services)

Download: https://github.com/WazeHell/PE-Linux

Other Hacking Tools

Explore All Hacking Tools »
UFTP - UDP based FTP with encryption
UFTP - UDP based FTP with encryption
Read Details »
Executable Compression demystified
Executable Compression demystified
Read Details »
BitCracker – Password Cracking Tool
BitCracker – Password Cracking Tool
Read Details »
BloodHound – Red / Blue teaming tool for AD attacks
BloodHound – Red / Blue teaming tool for AD attacks
Read Details »

Research Articles

Read All Research Articles »
Cyber Criminals are turning into Cryptominers, Dominating Cyber Threat Landscape
Cyber Criminals are turning into Cryptominers, Dominating Cyber Threat Landscape

According to Check Point, during the period July to December 2017, one in five Organizations are affected by crypto mining malware, tools that enable cybercriminals to hijack the victim's CPU or GPU power and existing resources to mine cryptocurrency, using as much as 65% of the end-users CPU power.

Read Details

Breaking News

Breaking News Of Each Month »
85 password stealing apps found on Google Playstore
85 password stealing apps found on Google Playstore

Security researchers discovered malicious apps designed to steal credentials from users have been downloaded million times from Google play store. Among these, the most popular app is a gaming app.

Read Details