Ycarus Gentoo ebuild

pentoo

These ebuilds come from .

If you have some problems, go to the official site first.

app-exploits

deathstar : A tool to gain Domain Admin rights with a push of a button ( https://github.com/byt3bl33d3r/DeathStar )

empire : A post-exploitation framework ( https://github.com/BC-SECURITY/Empire )

enumdb : Database brute force and post exploitation tool ( https://github.com/m8r0wn/enumdb )

exploit-pattern : Generate and search pattern string for exploit development ( https://github.com/Svenito/exploit-pattern )

exploitdb : All exploits from exploit-db.com ( https://www.exploit-db.com/ )

exploitdb-papers : Exploit database's papers ( https://www.exploit-db.com/ )

getsploit : Command line utility for searching and downloading exploits ( https://github.com/vulnersCom/getsploit )

h2rs : Detects request smuggling via HTTP/2 downgrades ( https://github.com/riramar/h2rs/ )

linenum : Local Linux enumeration and privilege escalation checker ( https://github.com/rebootuser/LinEnum )

linux-exploit-suggester : Linux Exploit Suggester based on operating system release number ( https://github.com/InteliSecureLabs/Linux_Exploit_Suggester )

linuxprivchecker : A Linux Privilege Escalation Check Script ( https://github.com/sleventyeleven/linuxprivchecker )

packetstormexploits : Archive of packetstorm exploits ( https://packetstormsecurity.com/ )

packetstormexploits-meta : Meta ebuild of packetstorm exploits ( http://packetstormsecurity.net )

powercat : Netcat: The powershell version ( https://github.com/besimorhino/powercat )

proton : Windows post-exploitation framework using Windows Script Host ( https://github.com/entynetproject/proton )

pwntools : CTF framework and exploit development library ( https://github.com/Gallopsled/pwntools )

pypykatz : Python implementation of Mimikatz ( https://github.com/skelsec/pypykatz )

routersploit : An open-source exploitation framework dedicated to embedded devices ( https://github.com/threat9/routersploit/wiki )

traitor : Automatically exploit low-hanging fruit to pop a root shell ( https://github.com/liamg/traitor )

unix-privesc-check : Shell script to check for simple privilege escalation vectors ( https://github.com/pentestmonkey/unix-privesc-check )

webshells : Various webshells ( https://github.com/BlackArch/webshells )

weevely : Weevely is a stealth PHP web shell that simulate telnet-like console ( https://github.com/epinna/weevely3 )

wesng : Windows Exploit Suggester - Next Generation ( https://github.com/bitsadmin/wesng )

Add an ebuild in portage :

The ebuild is now in the portage tree.

You can also use layman : emerge layman then layman -a pentoo

For Paludis use this rsync : rsync://gentoo.zugaina.org/pentoo-portage

If you have a problem : ycarus(-at-)zugaina.org