This tool essentially outputs a list of exploits that you might want to try out after you gain local access to a host. Nothing you cannot do manually, and not the most brilliant tool ever but still, useful.
The next stage after gaining local access to a host is to escalate privileges, right? Typical techniques include:
- Manipulation of any custom tools which might installed (SUID files, cron jobs)
- Obtaining credentials from backup files (other places) which may have weak file permissions
- Password bruteforcing
- Manipulation of 3rd part tools that have been installed (e.g. weak file permission on config files or in /etc/init.d)
- Exploitation of public vulnerabiliites in software that's currently installed
- This tools focusses on making the last technique as simply as possible. It quickly identifies the existing vulnerabilities (due to poor patching policies, for example), and outputs a link to a public advisory or exploit.
This tool doesn't provide the exploit code or teach you on how to use it. It just points you in the right direction.