Locating Public Exploits
searchsploit
Search the local Exploit-DB copy:
searchsploit <service> <version>
Exploit-DB (Online)
Search parameters for privilege escalation:
- Type: local
- Platform: Windows or Linux
- Search: priv esc
GitHub
Search for CVE identifiers and PoC code.
Fixing Exploits
Exploits may need modification before use:
- Update hardcoded IPs and ports
- Change payload/shellcode
- Fix compatibility issues for the target architecture
- Cross-compile for the target OS
tip
When copying exploit scripts between systems, you may need to remove Windows carriage return characters: sed -e "s/\r//" exploit.sh > clean.sh