How to Install and Uninstall linux-exploit-suggester Package on Kali Linux

Last updated: January 10,2025

1. Install "linux-exploit-suggester" package

This is a short guide on how to install linux-exploit-suggester on Kali Linux

$ sudo apt update $ sudo apt install linux-exploit-suggester

2. Uninstall "linux-exploit-suggester" package

Learn how to uninstall linux-exploit-suggester on Kali Linux:

$ sudo apt remove linux-exploit-suggester $ sudo apt autoclean && sudo apt autoremove

3. Information about the linux-exploit-suggester package on Kali Linux

Package: linux-exploit-suggester
Version: 1.1-0kali2
Architecture: all
Maintainer: Kali Developers
Installed-Size: 99
Depends: less
Homepage: https://github.com/mzet-/linux-exploit-suggester
Priority: optional
Section: utils
Filename: pool/main/l/linux-exploit-suggester/linux-exploit-suggester_1.1-0kali2_all.deb
Size: 24684
SHA256: 774cc61edf0d818156de4f3178f8c4ec4d1ceaae9d09dad04b2718684ed01b7c
SHA1: cc83a56dcb5cdfc73885811e2b8106b85ce67302
MD5sum: ac600dc4845059d46b93621483c54924
Description: LES: Linux privilege escalation auditing tool
This package contains a Linux privilege escalation auditing tool. It's
designed to assist in detecting security deficiencies for given Linux
kernel/Linux-based machine. It provides following functionality:
- Assessing kernel exposure on publicly known exploits
Tool assesses (using heuristics methods discussed in details here) exposure of
the given kernel on every publicly known Linux kernel exploit. For each
exploit, exposure is calculated
- Verifying state of kernel hardening security measures
LES can check for most of security settings available by your Linux kernel. It
verifies not only the kernel compile-time configurations (CONFIGs) but also
verifies run-time settings (sysctl) giving more complete picture of security
posture for running kernel. This functionality is modern continuation of
--kernel switch from checksec.sh tool by Tobias Klein.
Description-md5: