Linux Exploit Suggester is a lightweight Perl script designed to help security testers quickly identify local Linux kernel privilege-escalation candidates by matching the host’s kernel/OS release string against a curated list of known vulnerable versions. It runs uname -r by default (or accepts a manual -k kernel string) and prints a suggestive, human-readable list of possible exploit names, CVEs, and references that match that kernel version. The tool intentionally keeps its logic simple: it performs string matching and warns that patched or back-ported kernels can mislead results, so its output should be treated as pointers for further verification rather than definitive proof of exploitable code. Sample output demonstrates common exploit names, CVEs, and direct exploit-db / vendor links to aid triage.
Features
- JSON and machine-readable output mode for automated pipelines
- Heuristic detection to flag likely back-ported or vendor-patched kernels
- Built-in, sandboxed PoC verifier that runs exploits inside an isolated container
- Regularly updated offline vulnerability DB with provenance and change log
- Plugin architecture for adding custom exploit lists or private exploit feeds
- Enhanced filtering by impact, exploit maturity, and CVE publication date