From 431bdc2deb74107476480d5135c1d1d2ed2109b9 Mon Sep 17 00:00:00 2001 From: Carlos Polop Date: Mon, 4 Nov 2019 10:04:56 +0000 Subject: [PATCH 1/5] Update README.md --- linPEAS/README.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/linPEAS/README.md b/linPEAS/README.md index 85cb45a..dd746e8 100755 --- a/linPEAS/README.md +++ b/linPEAS/README.md @@ -1,4 +1,6 @@ -# LinPEAS - Linux Privilege Escalation Awesome Script +# LinPEAS - Linux Privilege Escalation Awesome Script + +![](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/raw/master/linPEAS/images/linpeas.png) **LinPEAS is a script that searh for possible paths to escalate privileges on Linux/Unix\* hosts. The checks are explained on [book.hacktricks.xyz](https://book.hacktricks.xyz/linux-unix/privilege-escalation)** From be8b701199b3864c25694216188bb88c8103cb70 Mon Sep 17 00:00:00 2001 From: Carlos Polop Date: Mon, 4 Nov 2019 10:06:09 +0000 Subject: [PATCH 2/5] Update README.md --- README.md | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 1a25550..2285bc9 100755 --- a/README.md +++ b/README.md @@ -1,13 +1,15 @@ # PEASS - Privilege Escalation Awesome Scripts SUITE +![](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/raw/master/linPEAS/images/peass.png) + Here you will find **privilege escalation tools for Windows and Linux/Unix\*** (in some near future also for Mac). These tools search for possible **local privilege escalation paths** that you could exploit and print them to you **with nice colors** so you can recognize the misconfigurations easily. -- Check the **Local Windows Privilege Escalation checklist** from [book.hacktricks.xyz](https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation) +- Check the **Local Windows Privilege Escalation checklist** from **[book.hacktricks.xyz](https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation)** - **[WinPEAS](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/tree/master/winPEAS) - Windows local Privilege Escalation Awesome Script (C#.exe and .bat)** -- Check the **Local Linux Privilege Escalation checklist** from [book.hacktricks.xyz](https://book.hacktricks.xyz/linux-unix/linux-privilege-escalation-checklist) +- Check the **Local Linux Privilege Escalation checklist** from **[book.hacktricks.xyz](https://book.hacktricks.xyz/linux-unix/linux-privilege-escalation-checklist)** - **[LinPEAS](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/tree/master/linPEAS) - Linux local Privilege Escalation Awesome Script (.sh)** ## Do not fork it!! From 0a3ab3b52164c2188c85d811553902de0cadafc1 Mon Sep 17 00:00:00 2001 From: Carlos Polop Date: Mon, 4 Nov 2019 10:07:15 +0000 Subject: [PATCH 3/5] Update README.md --- winPEAS/README.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/winPEAS/README.md b/winPEAS/README.md index f857bb6..ebdfbd4 100755 --- a/winPEAS/README.md +++ b/winPEAS/README.md @@ -1,5 +1,7 @@ # Windows Privilege Escalation Awesome Scripts +![](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/raw/master/winPEAS/winPEASexe/images/winpeas.png) + Check the **Local Windows Privilege Escalation checklist** from **[book.hacktricks.xyz](https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation)** Check more **information about how to exploit** found misconfigurations in **[book.hacktricks.xyz](https://book.hacktricks.xyz/windows/windows-local-privilege-escalation)** From 1922890a67ac62a71694f9a3772ab69cee960004 Mon Sep 17 00:00:00 2001 From: Carlos Polop Date: Mon, 4 Nov 2019 10:07:37 +0000 Subject: [PATCH 4/5] Update README.md --- winPEAS/winPEASbat/README.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/winPEAS/winPEASbat/README.md b/winPEAS/winPEASbat/README.md index 91e02b8..4af3571 100755 --- a/winPEAS/winPEASbat/README.md +++ b/winPEAS/winPEASbat/README.md @@ -1,5 +1,7 @@ # Windows Privilege Escalation Awesome Script (.bat) +![](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/raw/master/winPEAS/winPEASexe/images/winpeas.png) + **WinPEAS is a script that searh for possible paths to escalate privileges on Windows hosts. The checks are explained on [book.hacktricks.xyz](https://book.hacktricks.xyz/windows/windows-local-privilege-escalation)** Check also the **Local Windows Privilege Escalation checklist** from [book.hacktricks.xyz](https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation) From 0cbd2afbbd1add9f64adacaf152ffa1790e8921a Mon Sep 17 00:00:00 2001 From: Carlos Polop Date: Mon, 4 Nov 2019 10:07:59 +0000 Subject: [PATCH 5/5] Update README.md --- winPEAS/winPEASexe/README.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/winPEAS/winPEASexe/README.md b/winPEAS/winPEASexe/README.md index 3f76912..aaee6ac 100755 --- a/winPEAS/winPEASexe/README.md +++ b/winPEAS/winPEASexe/README.md @@ -1,5 +1,7 @@ # Windows Privilege Escalation Awesome Script (.exe) +![](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/raw/master/winPEAS/winPEASexe/images/winpeas.png) + **WinPEAS is a script that searh for possible paths to escalate privileges on Windows hosts. The checks are explained on [book.hacktricks.xyz](https://book.hacktricks.xyz/windows/windows-local-privilege-escalation)** Check also the **Local Windows Privilege Escalation checklist** from **[book.hacktricks.xyz](https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation)**