deathstar : A tool to gain Domain Admin rights with a push of a button ( https://github.com/byt3bl33d3r/DeathStar )
empire : A post-exploitation framework ( https://github.com/BC-SECURITY/Empire )
enumdb : Database brute force and post exploitation tool ( https://github.com/m8r0wn/enumdb )
exploitdb : All exploits from exploit-db.com ( https://www.exploit-db.com/ )
exploitdb-papers : Exploit database's papers ( https://www.exploit-db.com/ )
getsploit : Command line utility for searching and downloading exploits ( https://github.com/vulnersCom/getsploit )
h2rs : Detects request smuggling via HTTP/2 downgrades ( https://github.com/riramar/h2rs/ )
linenum : Local Linux enumeration and privilege escalation checker ( https://github.com/rebootuser/LinEnum )
linux-exploit-suggester : Linux Exploit Suggester based on operating system release number ( https://github.com/InteliSecureLabs/Linux_Exploit_Suggester )
linuxprivchecker : A Linux Privilege Escalation Check Script ( https://github.com/sleventyeleven/linuxprivchecker )
packetstormexploits : Archive of packetstorm exploits ( https://packetstormsecurity.com/ )
packetstormexploits-meta : Meta ebuild of packetstorm exploits ( http://packetstormsecurity.net )
powercat : Netcat: The powershell version ( https://github.com/besimorhino/powercat )
pypykatz : Python implementation of Mimikatz ( https://github.com/skelsec/pypykatz )
routersploit : An open-source exploitation framework dedicated to embedded devices ( https://github.com/threat9/routersploit/wiki )
traitor : Automatically exploit low-hanging fruit to pop a root shell ( https://github.com/liamg/traitor )
unix-privesc-check : Shell script to check for simple privilege escalation vectors ( https://github.com/pentestmonkey/unix-privesc-check )
webshells : Various webshells ( https://github.com/BlackArch/webshells )
weevely : Weevely is a stealth PHP web shell that simulate telnet-like console ( https://github.com/epinna/weevely3 )
wesng : Windows Exploit Suggester - Next Generation ( https://github.com/bitsadmin/wesng )
Pour rajouter une e-build dans l'arbre de portage :
L'ebuild est alors rajouté dans l'arbre de portage.
Vous pouvez aussi utiliser layman : emerge layman puis layman -a pentoo
Pour Paludis utilisez ce rsync : rsync://gentoo.zugaina.org/pentoo-portage
En cas de problèmes : ycarus(-at-)zugaina.org