Linux Exploit Suggester 2 is a next-generation enumeration tool that helps identify potential local privilege-escalation vectors on Linux systems. It inspects the target kernel and OS release, compares that information against a curated database of known kernel vulnerabilities, and reports which exploit primitives are plausibly applicable to the host. The script can optionally download exploit proof-of-concept code from public exploit repositories to accelerate validation in controlled environments. It supports wildcard matching for kernel strings to broaden detection coverage and colorizes its output for easier reading in terminal sessions. Typical usage is simple and lightweight: run the script on the target (or pass a manual kernel string) and review the ranked list of candidate exploits and references.
Features
- An offline, regularly updated vulnerability database with change logs and source attributions
- A non-interactive JSON output mode suitable for automation and integration with orchestration tools
- Heuristic checks that flag likely back-ported or patched kernels to reduce false positives
- Built-in sandboxed exploit verification that runs PoCs in an isolated container and reports behavior
- A plugin system to add additional exploit repositories or custom exploit collections
- Enhanced filtering to show only exploits matching configured risk/impact levels