1
mirror of https://github.com/carlospolop/PEASS-ng synced 2024-11-24 01:26:22 +01:00

Update README.md

This commit is contained in:
Carlos Polop 2019-11-04 00:40:46 +00:00 committed by GitHub
parent c845d344a9
commit 86c3e4a966
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -5,10 +5,10 @@ Here you will find **privilege escalation tools for Windows and Linux/Unix\*** (
These tools search for possible **local privilege escalation paths** that you could exploit and print them to you **with nice colors** so you can recognize the misconfigurations easily.
- Check the **Local Windows Privilege Escalation checklist** from [book.hacktricks.xyz](https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation)
- **[WinPEAS](https://github.com/carlospolop/privilege-escalation-awsome-scripts-suite/winpeas) - Windows local Privilege Escalation Awsome Script (C#.exe and .bat)**
- **[WinPEAS](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/tree/master/winPEAS) - Windows local Privilege Escalation Awsome Script (C#.exe and .bat)**
- Check the **Local Linux Privilege Escalation checklist** from [book.hacktricks.xyz](https://book.hacktricks.xyz/linux-unix/linux-privilege-escalation-checklist)
- **[LinPEAS](https://github.com/carlospolop/privilege-escalation-awsome-scripts-suite/linpeas) - Linux local Privilege Escalation Awsome Script (.sh)**
- **[LinPEAS](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/tree/master/linPEAS) - Linux local Privilege Escalation Awsome Script (.sh)**
## Do not fork it!!