mirror of
https://github.com/carlospolop/PEASS-ng
synced 2025-02-21 10:30:58 +01:00
scripts
This commit is contained in:
parent
9f8c1f9975
commit
5477232b51
@ -1,20 +1,20 @@
|
||||
# PEASS - Privilege Escalation Awesome Scripts SUITE
|
||||
|
||||

|
||||

|
||||
|
||||
Here you will find **privilege escalation tools for Windows and Linux/Unix\*** (in some near future also for Mac).
|
||||
|
||||
These tools search for possible **local privilege escalation paths** that you could exploit and print them to you **with nice colors** so you can recognize the misconfigurations easily.
|
||||
|
||||
- Check the **Local Windows Privilege Escalation checklist** from **[book.hacktricks.xyz](https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation)**
|
||||
- **[WinPEAS](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/tree/master/winPEAS) - Windows local Privilege Escalation Awesome Script (C#.exe and .bat)**
|
||||
- **[WinPEAS](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS) - Windows local Privilege Escalation Awesome Script (C#.exe and .bat)**
|
||||
|
||||
- Check the **Local Linux Privilege Escalation checklist** from **[book.hacktricks.xyz](https://book.hacktricks.xyz/linux-unix/linux-privilege-escalation-checklist)**
|
||||
- **[LinPEAS](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/tree/master/linPEAS) - Linux local Privilege Escalation Awesome Script (.sh)**
|
||||
- **[LinPEAS](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS) - Linux local Privilege Escalation Awesome Script (.sh)**
|
||||
|
||||
## Do not fork it!!
|
||||
|
||||
If you want to **add something** and have **any cool idea** related to this project, please let me know it using **[github issues](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/issues)** and we will update the master version.
|
||||
If you want to **add something** and have **any cool idea** related to this project, please let me know it using **[github issues](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/issues)** and we will update the master version.
|
||||
|
||||
## Please, if this tool has been useful for you consider to donate
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
# LinPEAS - Linux Privilege Escalation Awesome Script
|
||||
|
||||

|
||||

|
||||
|
||||
**LinPEAS is a script that searh for possible paths to escalate privileges on Linux/Unix\* hosts. The checks are explained on [book.hacktricks.xyz](https://book.hacktricks.xyz/linux-unix/privilege-escalation)**
|
||||
|
||||
@ -12,7 +12,7 @@ Check the **Local Linux Privilege Escalation checklist** from **[book.hacktricks
|
||||
## Quick Start
|
||||
```bash
|
||||
#From github
|
||||
curl https://raw.githubusercontent.com/carlospolop/privilege-escalation-awesome-script-suite/master/linPEAS/linpeas.sh | sh
|
||||
curl https://raw.githubusercontent.com/carlospolop/privilege-escalation-awesome-scripts-suite/master/linPEAS/linpeas.sh | sh
|
||||
```
|
||||
|
||||
```bash
|
||||
@ -43,7 +43,7 @@ This script has **several lists** included inside of it to be able to **color th
|
||||
|
||||
LinPEAS also **exports a new PATH** variable if common folders aren't present in the original PATH variable. It also **exports** unset and export several environmental commands so no command executed during the session will be saved in the history file (you can avoid this actions using the parameter **-n**).
|
||||
|
||||

|
||||

|
||||
|
||||
## Hosts Discovery and Port Scanning
|
||||
|
||||
@ -51,7 +51,7 @@ With LinPEAS you can also **discover hosts automatically** using `fping`, `ping`
|
||||
|
||||
LinPEAS will **automatically search for this binaries** in `$PATH` and let you know if any of them is available. In that case you can use LinPEAS to hosts dicovery and/or port scanning.
|
||||
|
||||

|
||||

|
||||
|
||||
## Colors
|
||||
|
||||
@ -222,7 +222,7 @@ file="/tmp/linPE";RED='\033[0;31m';Y='\033[0;33m';B='\033[0;34m';NC='\033[0m';rm
|
||||
|
||||
## Do not fork it!!
|
||||
|
||||
If you want to **add something** and have **any cool idea** related to this project, please let me know it using **[github issues](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/issues)** and we will update the master version.
|
||||
If you want to **add something** and have **any cool idea** related to this project, please let me know it using **[github issues](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/issues)** and we will update the master version.
|
||||
|
||||
## Please, if this tool has been useful for you consider to donate
|
||||
|
||||
@ -239,9 +239,9 @@ Contact me and ask about the **Privilege Escalation Course** I am preparing for
|
||||
- Mantain updated all the blacklists used to color the output
|
||||
- Support for MacOS
|
||||
|
||||
If you want to help with any of this, you can do it using **[github issues](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/issues) or you can submit a pull request**.
|
||||
If you want to help with any of this, you can do it using **[github issues](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/issues) or you can submit a pull request**.
|
||||
|
||||
If you find any issue, please report it using **[github issues](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/issues)**.
|
||||
If you find any issue, please report it using **[github issues](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/issues)**.
|
||||
|
||||
|
||||
**Linpeas** is being **updated** every time I find something that could be useful to escalate privileges.
|
||||
|
@ -1,18 +1,18 @@
|
||||
# Windows Privilege Escalation Awesome Scripts
|
||||
|
||||

|
||||

|
||||
|
||||
Check the **Local Windows Privilege Escalation checklist** from **[book.hacktricks.xyz](https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation)**
|
||||
|
||||
Check more **information about how to exploit** found misconfigurations in **[book.hacktricks.xyz](https://book.hacktricks.xyz/windows/windows-local-privilege-escalation)**
|
||||
|
||||
## WinPEAS .exe and .bat
|
||||
- [Link to WinPEAS C# project (.exe)](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/tree/master/winPEAS/winPEASexe)
|
||||
- [Link to WinPEAS .bat project](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/tree/master/winPEAS/winPEASbat) Notice that WinPEAS.bat is a batch script made for Windows systems which don't support WinPEAS.exe (Net.4 required)
|
||||
- [Link to WinPEAS C# project (.exe)](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS/winPEASexe)
|
||||
- [Link to WinPEAS .bat project](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS/winPEASbat) Notice that WinPEAS.bat is a batch script made for Windows systems which don't support WinPEAS.exe (Net.4 required)
|
||||
|
||||
## Do not fork it!!
|
||||
|
||||
If you want to **add something** and have **any cool idea** related to this project, please let me know it using the [github issues](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/issues) and we will update the master version.
|
||||
If you want to **add something** and have **any cool idea** related to this project, please let me know it using the [github issues](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/issues) and we will update the master version.
|
||||
|
||||
## Please, if this tool has been useful for you consider to donate
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
# Windows Privilege Escalation Awesome Script (.bat)
|
||||
|
||||

|
||||

|
||||
|
||||
**WinPEAS is a script that searh for possible paths to escalate privileges on Windows hosts. The checks are explained on [book.hacktricks.xyz](https://book.hacktricks.xyz/windows/windows-local-privilege-escalation)**
|
||||
|
||||
@ -122,7 +122,7 @@ This is the kind of outpuf that you have to look for when usnig the winPEAS.bat
|
||||
|
||||
## Do not fork it!!
|
||||
|
||||
If you want to **add something** and have **any cool idea** related to this project, please let me know it using the [github issues](hhttps://github.com/carlospolop/privilege-escalation-awesome-script-suite/issues) and we will update the master version.
|
||||
If you want to **add something** and have **any cool idea** related to this project, please let me know it using the [github issues](hhttps://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/issues) and we will update the master version.
|
||||
|
||||
## Please, if this tool has been useful for you consider to donate
|
||||
|
||||
|
@ -1,16 +1,16 @@
|
||||
# Windows Privilege Escalation Awesome Script (.exe)
|
||||
|
||||

|
||||

|
||||
|
||||
**WinPEAS is a script that searh for possible paths to escalate privileges on Windows hosts. The checks are explained on [book.hacktricks.xyz](https://book.hacktricks.xyz/windows/windows-local-privilege-escalation)**
|
||||
|
||||
Check also the **Local Windows Privilege Escalation checklist** from **[book.hacktricks.xyz](https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation)**
|
||||
|
||||
[](https://youtu.be/66gOwXMnxRI)
|
||||
[](https://youtu.be/66gOwXMnxRI)
|
||||
|
||||
## Quick Start
|
||||
|
||||
Download the **[latest version from here](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/tree/master/winPEAS/winPEASexe/winPEAS/bin)** or **compile it yourself**.
|
||||
Download the **[latest version from here](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS/winPEASexe/winPEAS/bin)** or **compile it yourself**.
|
||||
```bash
|
||||
winpeas.exe ansi cmd searchfast #ANSI color for linux consoles (reverse shell), cmd commands and avoid sleepig
|
||||
winpeas.exe #Will execute all checks except the ones that execute MD commands
|
||||
@ -35,11 +35,11 @@ The tool is heavily based in **[SeatBelt](https://github.com/GhostPack/Seatbelt)
|
||||
|
||||
## Help
|
||||
|
||||

|
||||

|
||||
|
||||
## Colors
|
||||
|
||||

|
||||

|
||||
|
||||
## Checks
|
||||
|
||||
@ -127,7 +127,7 @@ The tool is heavily based in **[SeatBelt](https://github.com/GhostPack/Seatbelt)
|
||||
|
||||
## Do not fork it!!
|
||||
|
||||
If you want to **add something** and have **any cool idea** related to this project, please let me know it using the **[github issues](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/issues)** and we will update the master version.
|
||||
If you want to **add something** and have **any cool idea** related to this project, please let me know it using the **[github issues](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/issues)** and we will update the master version.
|
||||
|
||||
## Please, if this tool has been useful for you consider to donate
|
||||
|
||||
@ -144,9 +144,9 @@ Contact me and ask about the **Privilege Escalation Course** I am preparing for
|
||||
- List wifi networks without using CMD
|
||||
- List credentials inside the Credential Manager without using CMD
|
||||
|
||||
If you want to help with any of this, you can do it using **[github issues](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/issues)** or you can submit a pull request.
|
||||
If you want to help with any of this, you can do it using **[github issues](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/issues)** or you can submit a pull request.
|
||||
|
||||
If you find any issue, please report it using **[github issues](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/issues)**.
|
||||
If you find any issue, please report it using **[github issues](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/issues)**.
|
||||
|
||||
**WinPEAS** is being **updated** every time I find something that could be useful to escalate privileges.
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user