1
mirror of https://github.com/carlospolop/PEASS-ng synced 2024-11-27 14:13:38 +01:00
PEASS-ng/README.md

37 lines
2.3 KiB
Markdown
Raw Normal View History

2019-11-04 02:20:27 +01:00
# PEASS - Privilege Escalation Awesome Scripts SUITE
2019-11-04 01:38:24 +01:00
2019-11-05 13:33:48 +01:00
![](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/raw/master/linPEAS/images/peass.png)
2019-11-04 11:06:09 +01:00
2019-11-04 01:38:24 +01:00
Here you will find **privilege escalation tools for Windows and Linux/Unix\*** (in some near future also for Mac).
These tools search for possible **local privilege escalation paths** that you could exploit and print them to you **with nice colors** so you can recognize the misconfigurations easily.
2019-11-04 11:06:09 +01:00
- Check the **Local Windows Privilege Escalation checklist** from **[book.hacktricks.xyz](https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation)**
2019-11-05 13:33:48 +01:00
- **[WinPEAS](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS) - Windows local Privilege Escalation Awesome Script (C#.exe and .bat)**
2019-11-04 01:38:24 +01:00
2019-11-04 11:06:09 +01:00
- Check the **Local Linux Privilege Escalation checklist** from **[book.hacktricks.xyz](https://book.hacktricks.xyz/linux-unix/linux-privilege-escalation-checklist)**
2019-11-05 13:33:48 +01:00
- **[LinPEAS](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS) - Linux local Privilege Escalation Awesome Script (.sh)**
2019-11-04 01:38:24 +01:00
2020-01-18 01:16:05 +01:00
## Let's improve PEASS together
2019-11-04 01:38:24 +01:00
2020-01-18 01:16:05 +01:00
If you want to **add something** and have **any cool idea** related to this project, please let me know it in the **telegram group https://t.me/peass** or using **[github issues](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/issues)** and we will update the master version.
2019-11-04 01:38:24 +01:00
2019-11-04 14:43:06 +01:00
## Please, if this tool has been useful for you consider to donate
[![paypal](https://www.paypalobjects.com/en_US/i/btn/btn_donateCC_LG.gif)](https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=DED2HWDYLFT2C&source=url)
2019-11-04 17:22:22 +01:00
## Looking for a useful Privilege Escalation Course?
Contact me and ask about the **Privilege Escalation Course** I am preparing for attackers and defenders (**100% technical**).
2020-01-18 01:00:00 +01:00
## Advisory
All the scripts/binaries of the PEAS suite should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own networks and/or with the network owner's permission.
2019-11-04 01:38:24 +01:00
## License
MIT License
2019-11-04 01:40:46 +01:00
By Polop<sup>(TM)</sup>