<div style="margin:20px 0 0 200px"> To view the site, enable JavaScript by changing your browser options, then <a href="">Try Again</a>.</div>

PE Linux - Linux Privilege Escalation Tool

18 Jun, 2018
PE Linux - Linux Privilege Escalation Tool
  • Getting Started
  • System Information Gatherer
  • Kernel Information Gatherer
  • Checking Development environments on the system (Escaping Restricted Shells)
  • Extract PATH & environment Information
  • Check Kernel if Vulnerable To Dirty cow Exploit
  • Password Collector
  • Log Analyzer For interesting Information
  • Check Password Policy
  • Database Password Collector
  • Check If SSH Are Allowed With Root
  • Checking For interesting Root,Home,Var Directory Files
  • RSA Key's Collector
  • Command History Analyzer
  • Users Enumeration (Root - Sudo - UID List - GID List)
  • Cron Jobs Enumeration (Permissions - Own Cron - Cron Content - Writable Cron)
  • Network Information Lookup (TCP Connections - ARP - Services)

Download: https://github.com/WazeHell/PE-Linux

Other Hacking Tools

Explore All Hacking Tools »

Exclusive Blog

Read All Exclusive Blog »
Android Banking Trojan targets over 232 banking apps, including Indian banks
Cyber Criminals are turning into Cryptominers, Dominating Cyber Threat Landscape

According to Check Point, during the period July to December 2017, one in five Organizations are affected by crypto mining malware, tools that enable cybercriminals to hijack the victim's CPU or GPU power and existing resources to mine cryptocurrency, using as much as 65% of the end-users CPU power.

Read Details

Breaking News

Breaking News Of Each Month »
85 password stealing apps found on Google Playstore
85 password stealing apps found on Google Playstore

Security researchers discovered malicious apps designed to steal credentials from users have been downloaded million times from Google play store. Among these, the most popular app is a gaming app.

Read Details