1
mirror of https://github.com/carlospolop/PEASS-ng synced 2025-03-18 04:04:12 +01:00

42 lines
2.5 KiB
Markdown
Raw Normal View History

2021-07-16 14:26:45 +01:00
# PEASS-ng - Privilege Escalation Awesome Scripts SUITE new generation
2019-11-04 01:38:24 +01:00
2019-11-05 07:33:48 -05:00
![](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/raw/master/linPEAS/images/peass.png)
2019-11-04 10:06:09 +00:00
2021-09-19 10:26:07 -04:00
![](https://img.shields.io/badge/Black-Arch-black) ![](https://img.shields.io/badge/Arch-AUR-brightgreen) ![](https://img.shields.io/badge/Black%20Hat%20Arsenal-Asia%202020-red)
2021-07-16 15:43:55 +01:00
2021-08-09 12:39:13 +01:00
# Basic Tutorial
2021-08-20 10:05:36 +01:00
[![Tutorial](https://img.youtube.com/vi/2Ey1WQXNp3w/0.jpg)](https://www.youtube.com/watch?v=9_fJv_weLU0&list=PL9fPq3eQfaaDxjpXaDYApfVA_IB8T14w7)
2021-08-09 12:39:13 +01:00
2020-04-12 17:15:10 +01:00
2021-02-15 09:13:30 +00:00
Here you will find **privilege escalation tools for Windows and Linux/Unix\* and MacOS**.
2019-11-04 01:38:24 +01:00
These tools search for possible **local privilege escalation paths** that you could exploit and print them to you **with nice colors** so you can recognize the misconfigurations easily.
2019-11-04 10:06:09 +00:00
- Check the **Local Windows Privilege Escalation checklist** from **[book.hacktricks.xyz](https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation)**
2019-11-05 07:33:48 -05:00
- **[WinPEAS](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS) - Windows local Privilege Escalation Awesome Script (C#.exe and .bat)**
2019-11-04 01:38:24 +01:00
2019-11-04 10:06:09 +00:00
- Check the **Local Linux Privilege Escalation checklist** from **[book.hacktricks.xyz](https://book.hacktricks.xyz/linux-unix/linux-privilege-escalation-checklist)**
2019-11-05 07:33:48 -05:00
- **[LinPEAS](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS) - Linux local Privilege Escalation Awesome Script (.sh)**
2019-11-04 01:38:24 +01:00
2021-12-29 13:47:01 -05:00
## Quick Start
2021-12-29 21:27:05 +00:00
Find the **latest versions of all the scripts and binaries in [the releases page](https://github.com/carlospolop/PEASS-ng/releases/latest)**.
2021-12-29 13:47:01 -05:00
2020-01-17 19:16:05 -05:00
## Let's improve PEASS together
2019-11-04 01:38:24 +01:00
2021-07-13 12:13:00 +02:00
If you want to **add something** and have **any cool idea** related to this project, please let me know it in the **telegram group https://t.me/peass** or contribute reading the **[CONTRIBUTING.md](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/blob/master/CONTRIBUTING.md)** file.
2019-11-04 01:38:24 +01:00
2021-02-18 08:55:06 -05:00
## PEASS Style
2019-11-04 11:22:22 -05:00
2021-02-18 08:55:06 -05:00
Are you a PEASS fan? Get now our merch at **[PEASS Shop](https://teespring.com/stores/peass)** and show your love for our favorite peas
2019-11-04 11:22:22 -05:00
2020-01-17 19:00:00 -05:00
## Advisory
2021-12-29 13:47:01 -05:00
All the scripts/binaries of the PEAS suite should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own machines and/or with the owner's permission.
2020-01-17 19:00:00 -05:00
2019-11-04 01:38:24 +01:00
## License
MIT License
2019-11-04 00:40:46 +00:00
By Polop<sup>(TM)</sup>