1
mirror of https://github.com/carlospolop/PEASS-ng synced 2024-11-24 01:26:22 +01:00
Go to file
2021-07-14 22:14:48 +02:00
.github - updated CI-winpeas_dev_test.yml 2021-07-14 22:14:48 +02:00
build_lists linpeas 2021-07-13 11:44:43 +02:00
linPEAS linpeas.sh auto update 2021-07-13 10:33:00 +00:00
parser parser 2021-07-13 14:19:31 +02:00
winPEAS winpeas binaries auto update 2021-07-07 13:30:10 +00:00
.gitignore finish 2021-06-17 23:13:11 +02:00
CONTRIBUTING.md Update CONTRIBUTING.md 2021-07-13 12:08:15 +02:00
LICENSE Winpeas 2020-04-10 18:54:38 +01:00
README.md linpeas readmes 2021-07-13 12:13:00 +02:00

PEASS - Privilege Escalation Awesome Scripts SUITE

Packaging status

Here you will find privilege escalation tools for Windows and Linux/Unix* and MacOS.

These tools search for possible local privilege escalation paths that you could exploit and print them to you with nice colors so you can recognize the misconfigurations easily.

  • Check the Local Windows Privilege Escalation checklist from book.hacktricks.xyz

  • WinPEAS - Windows local Privilege Escalation Awesome Script (C#.exe and .bat)

  • Check the Local Linux Privilege Escalation checklist from book.hacktricks.xyz

  • LinPEAS - Linux local Privilege Escalation Awesome Script (.sh)

Let's improve PEASS together

If you want to add something and have any cool idea related to this project, please let me know it in the telegram group https://t.me/peass or contribute reading the CONTRIBUTING.md file.

Please, if this tool has been useful for you consider to donate

paypal

PEASS Style

Are you a PEASS fan? Get now our merch at PEASS Shop and show your love for our favorite peas

Advisory

All the scripts/binaries of the PEAS suite should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own networks and/or with the network owner's permission.

License

MIT License

By Polop(TM)