1
mirror of https://github.com/carlospolop/PEASS-ng synced 2024-11-27 14:13:38 +01:00
Go to file
Kevin Pham f3495c48e9
Update 1_system_information.sh
More robust implementation of pkexec binary modification time check with integer comparison instead of date regex grep.

1642035600 == Thursday, January 13, 2022 1:00:00 AM
Which is when it was first patched. We have to check this way because the polkit version number is the same, patched & unpatched.
2022-02-02 21:30:43 -08:00
.github Update CI-master_tests.yml 2022-01-31 13:19:53 +00:00
build_lists log4j 2021-12-23 20:41:15 -05:00
linPEAS Update 1_system_information.sh 2022-02-02 21:30:43 -08:00
metasploit Update peass.rb 2022-01-24 10:33:57 +00:00
parser linpeas 2021-07-26 12:49:47 +01:00
winPEAS Update README.md 2022-01-16 12:04:31 +00:00
.gitignore use releases page 2021-12-29 13:47:01 -05:00
CONTRIBUTING.md separated linpeas 2021-12-18 14:48:01 -05:00
LICENSE use releases page 2021-12-29 13:47:01 -05:00
README.md Fix CRLF 2021-12-31 12:18:31 -05:00
TODO.md Update TODO.md 2021-10-04 17:22:07 +01:00

PEASS-ng - Privilege Escalation Awesome Scripts SUITE new generation

Basic Tutorial

Tutorial

Here you will find privilege escalation tools for Windows and Linux/Unix* and MacOS.

These tools search for possible local privilege escalation paths that you could exploit and print them to you with nice colors so you can recognize the misconfigurations easily.

  • Check the Local Windows Privilege Escalation checklist from book.hacktricks.xyz

  • WinPEAS - Windows local Privilege Escalation Awesome Script (C#.exe and .bat)

  • Check the Local Linux Privilege Escalation checklist from book.hacktricks.xyz

  • LinPEAS - Linux local Privilege Escalation Awesome Script (.sh)

Quick Start

Find the latest versions of all the scripts and binaries in the releases page.

Let's improve PEASS together

If you want to add something and have any cool idea related to this project, please let me know it in the telegram group https://t.me/peass or contribute reading the CONTRIBUTING.md file.

PEASS Style

Are you a PEASS fan? Get now our merch at PEASS Shop and show your love for our favorite peas

Advisory

All the scripts/binaries of the PEAS suite should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own machines and/or with the owner's permission.

By Polop(TM)