1
mirror of https://github.com/carlospolop/PEASS-ng synced 2024-11-20 12:39:21 +01:00
Go to file
Dante fa5578b2ff
Refactor peasLoaded.py for Improved Efficiency
This pull request introduces a set of improvements to the peasLoaded.py file, aimed at enhancing the readability, maintainability, and performance of the code. The key changes include:

- Indentation Correction: Fixed the indentation to comply with Python standards, ensuring proper code block recognition and avoiding potential runtime errors.

- List Comprehension: Implemented list comprehension for the creation of FileRecord instances, which simplifies the code structure and improves readability.

- Configuration Handling: Streamlined the access to the config dictionary by extracting it once at the beginning of the loop, reducing repetitive code and potential access errors.

- Default Value Usage: Utilized the .get() method with default values from DEFAULTS for both `auto_check` and `exec` keys.

These changes do not alter the core functionality of the code but provide a cleaner and more efficient approach to the existing logic.

Please review the changes and let me know if there are any concerns or further improvements that can be made.
2024-05-05 14:50:25 +02:00
.github Update CI-master_tests.yml 2024-05-05 11:48:54 +02:00
build_lists fix 2024-02-21 16:39:57 +01:00
linPEAS Refactor peasLoaded.py for Improved Efficiency 2024-05-05 14:50:25 +02:00
metasploit peass-ng 2024-04-04 11:30:56 +02:00
parsers peass-ng 2024-04-04 11:30:56 +02:00
winPEAS peass-ng 2024-04-04 11:30:56 +02:00
.gitignore add .gitignore 2023-04-13 22:43:10 +02:00
CONTRIBUTING.md peass-ng 2024-04-04 11:30:56 +02:00
LICENSE use releases page 2021-12-29 13:47:01 -05:00
README.md peass-ng 2024-04-04 11:30:56 +02:00
TODO.md peass-ng 2024-04-04 11:30:56 +02:00

PEASS-ng - Privilege Escalation Awesome Scripts SUITE new generation

Basic Tutorial

Tutorial

Here you will find privilege escalation tools for Windows and Linux/Unix* and MacOS.

These tools search for possible local privilege escalation paths that you could exploit and print them to you with nice colors so you can recognize the misconfigurations easily.

  • Check the Local Windows Privilege Escalation checklist from book.hacktricks.xyz

  • WinPEAS - Windows local Privilege Escalation Awesome Script (C#.exe and .bat)

  • Check the Local Linux Privilege Escalation checklist from book.hacktricks.xyz

  • LinPEAS - Linux local Privilege Escalation Awesome Script (.sh)

Quick Start

Find the latest versions of all the scripts and binaries in the releases page.

JSON, HTML & PDF output

Check the parsers directory to transform PEASS outputs to JSON, HTML and PDF

Join us!

If you are a PEASS & Hacktricks enthusiast, you can get your hands now on our custom swag and show how much you like our projects!

You can also, join the 💬 Discord group or the telegram group to learn about latest news in cybersecurity and meet other cybersecurity enthusiasts, or follow me on Twitter 🐦 @hacktricks_live.

Let's improve PEASS together

If you want to add something and have any cool idea related to this project, please let me know it in the telegram group https://t.me/peass or contribute reading the CONTRIBUTING.md file.

Advisory

All the scripts/binaries of the PEAS suite should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own machines and/or with the owner's permission.

By Polop(TM)