diff --git a/README.md b/README.md index 1a25550..2285bc9 100755 --- a/README.md +++ b/README.md @@ -1,13 +1,15 @@ # PEASS - Privilege Escalation Awesome Scripts SUITE +![](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/raw/master/linPEAS/images/peass.png) + Here you will find **privilege escalation tools for Windows and Linux/Unix\*** (in some near future also for Mac). These tools search for possible **local privilege escalation paths** that you could exploit and print them to you **with nice colors** so you can recognize the misconfigurations easily. -- Check the **Local Windows Privilege Escalation checklist** from [book.hacktricks.xyz](https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation) +- Check the **Local Windows Privilege Escalation checklist** from **[book.hacktricks.xyz](https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation)** - **[WinPEAS](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/tree/master/winPEAS) - Windows local Privilege Escalation Awesome Script (C#.exe and .bat)** -- Check the **Local Linux Privilege Escalation checklist** from [book.hacktricks.xyz](https://book.hacktricks.xyz/linux-unix/linux-privilege-escalation-checklist) +- Check the **Local Linux Privilege Escalation checklist** from **[book.hacktricks.xyz](https://book.hacktricks.xyz/linux-unix/linux-privilege-escalation-checklist)** - **[LinPEAS](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/tree/master/linPEAS) - Linux local Privilege Escalation Awesome Script (.sh)** ## Do not fork it!! diff --git a/linPEAS/README.md b/linPEAS/README.md index 85cb45a..dd746e8 100755 --- a/linPEAS/README.md +++ b/linPEAS/README.md @@ -1,4 +1,6 @@ -# LinPEAS - Linux Privilege Escalation Awesome Script +# LinPEAS - Linux Privilege Escalation Awesome Script + +![](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/raw/master/linPEAS/images/linpeas.png) **LinPEAS is a script that searh for possible paths to escalate privileges on Linux/Unix\* hosts. The checks are explained on [book.hacktricks.xyz](https://book.hacktricks.xyz/linux-unix/privilege-escalation)** diff --git a/winPEAS/README.md b/winPEAS/README.md index f857bb6..ebdfbd4 100755 --- a/winPEAS/README.md +++ b/winPEAS/README.md @@ -1,5 +1,7 @@ # Windows Privilege Escalation Awesome Scripts +![](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/raw/master/winPEAS/winPEASexe/images/winpeas.png) + Check the **Local Windows Privilege Escalation checklist** from **[book.hacktricks.xyz](https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation)** Check more **information about how to exploit** found misconfigurations in **[book.hacktricks.xyz](https://book.hacktricks.xyz/windows/windows-local-privilege-escalation)** diff --git a/winPEAS/winPEASbat/README.md b/winPEAS/winPEASbat/README.md index 91e02b8..4af3571 100755 --- a/winPEAS/winPEASbat/README.md +++ b/winPEAS/winPEASbat/README.md @@ -1,5 +1,7 @@ # Windows Privilege Escalation Awesome Script (.bat) +![](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/raw/master/winPEAS/winPEASexe/images/winpeas.png) + **WinPEAS is a script that searh for possible paths to escalate privileges on Windows hosts. The checks are explained on [book.hacktricks.xyz](https://book.hacktricks.xyz/windows/windows-local-privilege-escalation)** Check also the **Local Windows Privilege Escalation checklist** from [book.hacktricks.xyz](https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation) diff --git a/winPEAS/winPEASexe/README.md b/winPEAS/winPEASexe/README.md index 3f76912..aaee6ac 100755 --- a/winPEAS/winPEASexe/README.md +++ b/winPEAS/winPEASexe/README.md @@ -1,5 +1,7 @@ # Windows Privilege Escalation Awesome Script (.exe) +![](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/raw/master/winPEAS/winPEASexe/images/winpeas.png) + **WinPEAS is a script that searh for possible paths to escalate privileges on Windows hosts. The checks are explained on [book.hacktricks.xyz](https://book.hacktricks.xyz/windows/windows-local-privilege-escalation)** Check also the **Local Windows Privilege Escalation checklist** from **[book.hacktricks.xyz](https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation)**