Windows提权辅助工具Windows-Exploit-Suggester
2019年08月14日安装 python 3.3.3
安装xlrd库 https://pypi.org/project/xlrd/
https://www.python.org/ftp/python/3.3.3/python-3.3.3.amd64.msi
https://www.python.org/ftp/python/3.3.3/python-3.3.3.msi
https://pypi.python.org/packages/42/85/25caf967c2d496067489e0bb32df069a8361e1fd96a7e9f35408e56b3aab/xlrd-1.0.0.tar.gz#md5=9a91b688cd4945477ac28187a54f9a3b
https://codeload.github.com/GDSSecurity/Windows-Exploit-Suggester/zip/master
xlrd-1.0.0.tar.gz 放在python3.3.3 目录下
setup.py install //安装xlrd-1.0.0.tar.gz
windows-exploit-suggester.py --update //更新漏洞库
windows-exploit-suggester.py --database 2019-08-14-mssb.xls --systeminfo w12-sysinfo.txt // 进行对比
windows-exploit-suggester.py -h //查看帮助文件
windows-exploit-suggester.py -audit -l --database 2019-08-14-mssb.xls --systeminfo w12-sysinfo.txt audit -l 对本地溢出漏洞进行审计 audit -r 对远程溢出漏洞进行审计
windows-exploit-suggester.py --database 2019-08-14-mssb.xls --ostext "windows server 2008 r2" 查询server 2008 r2 提权 poc信息
site:exploit-db.com”
packetstormsecurity.com 网站搜索
https://packetstormsecurity.com/search/?q=MS16-016
https://github.com/GDSSecurity/Windows-Exploit-Suggester
Linux
linux-exploit-suggester-2
https://github.com/mzet-/linux-exploit-suggester
https://github.com/jondonas/linux-exploit-suggester-2
https://paper.seebug.org/papers/old_sebug_paper/linux_exp/