goEnum is a standalone CLI tools which no dependancies, this means all you will ever need it the binary itself
goEnum also has a robust help interface (thanks to Cobra!) for if you have any questions on what goEnum is doing
goEnum --help
System-Agnostic and Modular Enumeration Framework by Maxwell Fusco
Usage:
goEnum [flags]
goEnum [command]
Available Commands:
all run all available modules
completion Generate the autocompletion script for the specified shell
help Help about any command
modules display all available modules
none runs no modules
ssh execute goEnum over ssh remote connection
Flags:
-f, --format string output format [json, markdown]
-h, --help help for goEnum
-c, --no-color disable color output
-o, --output string output file
-v, --verbose verbose output
Use "goEnum [command] --help" for more information about a command.
goEnum modules
====== Modules ======
[+] services => Insecure Services and Utilized Binaries
[+] unquoted-service-path => Unquoted Service Paths
[+] cve-2021-3156 => CVE-2021-3156
[+] writable-files => Mispermissioned Files (readable)
[+] special-perms => SUID and GUID Files
[+] priv-container => Priviledged Container
[+] block-devices => Block Devices in Containers
[+] protected-files => Protected Files
[+] cronjobs => Cronjobs with Writable Executable
[+] readable-files => Mispermissioned Files (readable)
[+] docker-sock => Container with Docker Socket
goEnum cve-2021-3156
====== CVE-2021-3156 ======
[+] Prereqs: Passed
[+] Enumeration: Succeeded
[*] Reporting: Skipping
====== Report ======
=== CVE-2021-315 ===
Description: Vulnerable version of sudo allowing for Heap-Based Buffer Overflow Privelege Escalation
Files: /snap/bin/sudo
- /snap/bin/sudoedit
** Results for modules will vary based on the system executed on
Pull requests, forks, and issues are all welcome! Make sure to make open a new branch, pull request, and issues for any submitted changes and they will be reviewed!