Ycarus Gentoo ebuild

pentoo

These ebuilds come from .

If you have some problems, go to the official site first.

app-exploits

ROPgadget : Tool to search for gadgets in binaries to facilitate your ROP exploitation ( http://shell-storm.org/project/ROPgadget/ )

deathstar : A tool to gain Domain Admin rights with a push of a button ( https://github.com/byt3bl33d3r/DeathStar )

empire : A post-exploitation framework with Windows/Linux agents ( https://github.com/EmpireProject/Empire )

exploitdb : All exploits from exploit-db.com ( http://www.exploit-db.com/ )

exploitdb-papers : Exploit database's papers ( http://www.exploit-db.com/ )

getsploit : Command line utility for searching and downloading exploits ( https://github.com/vulnersCom/getsploit )

linenum : Local Linux enumeration and privilege escalation checker. ( https://github.com/rebootuser/LinEnum )

linux-exploit-suggester : Local Linux enumeration and privilege escalation checker. ( https://github.com/InteliSecureLabs/Linux_Exploit_Suggester )

linuxprivchecker : Local Linux enumeration and privilege escalation checker. ( https://github.com/sleventyeleven/linuxprivchecker )

packetstormexploits : Archive of packetstorm exploits ( http://packetstormsecurity.net )

packetstormexploits-meta : Meta ebuild of packetstorm exploits ( http://packetstormsecurity.net )

pwntools : CTF framework and exploit development library ( https://github.com/Gallopsled/pwntools )

routersploit : An open-source exploitation framework dedicated to embedded devices ( https://github.com/threat9/routersploit/wiki )

the-backdoor-factory : BDF allows to patch executable binaries with user desired shellcode ( https://github.com/secretsquirrel/the-backdoor-factory )

unix-privesc-check : Local Linux enumeration and privilege escalation checker. ( https://github.com/pentestmonkey/unix-privesc-check )

webshells : Various webshells ( https://github.com/BlackArch/webshells )

weevely : Weevely is a stealth PHP web shell that simulate telnet-like console ( https://github.com/epinna/weevely3 )

wesng : Windows Exploit Suggester - Next Generation ( https://github.com/bitsadmin/wesng )

Add an ebuild in portage :

The ebuild is now in the portage tree.

You can also use layman : emerge layman then layman -a pentoo

For Paludis use this rsync : rsync://gentoo.zugaina.org/pentoo-portage

If you have a problem : ycarus(-at-)zugaina.org