From b421697b168463fddfbc515978b0eb2a29b5f3ff Mon Sep 17 00:00:00 2001 From: Carlos Polop Date: Tue, 13 Jul 2021 12:52:10 +0200 Subject: [PATCH] readme updates --- winPEAS/README.md | 7 ++----- winPEAS/winPEASbat/README.md | 5 ----- winPEAS/winPEASexe/README.md | 5 ----- 3 files changed, 2 insertions(+), 15 deletions(-) diff --git a/winPEAS/README.md b/winPEAS/README.md index 5ec7b34..1f1b11a 100755 --- a/winPEAS/README.md +++ b/winPEAS/README.md @@ -7,12 +7,9 @@ Check the **Local Windows Privilege Escalation checklist** from **[book.hacktric Check more **information about how to exploit** found misconfigurations in **[book.hacktricks.xyz](https://book.hacktricks.xyz/windows/windows-local-privilege-escalation)** ## WinPEAS .exe and .bat -- [Link to WinPEAS C# project (.exe)](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS/winPEASexe) (.Net >= 4.5.2 required) - [Link to WinPEAS .bat project](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS/winPEASbat) - -## Let's improve PEASS together - -If you want to **add something** and have **any cool idea** related to this project, please let me know it in the **telegram group https://t.me/peass** or using **[github issues](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/issues)** and we will update the master version. +- [Link to WinPEAS C# project (.exe)](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS/winPEASexe) (.Net >= 4.5.2 required) + - **Please, read the Readme of that folder to learn how to execute winpeas from memory or how make colors work among other tricks** ## Please, if this tool has been useful for you consider to donate diff --git a/winPEAS/winPEASbat/README.md b/winPEAS/winPEASbat/README.md index cf3a656..3e13fa2 100755 --- a/winPEAS/winPEASbat/README.md +++ b/winPEAS/winPEASbat/README.md @@ -133,11 +133,6 @@ This is the kind of outpuf that you have to look for when usnig the winPEAS.bat [![paypal](https://www.paypalobjects.com/en_US/i/btn/btn_donateCC_LG.gif)](https://www.patreon.com/peass) -## Let's improve PEASS together - -If you want to **add something** and have **any cool idea** related to this project, please let me know it in the **telegram group https://t.me/peass** or using **[github issues](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/issues)** and we will update the master version. - - ## Advisory All the scripts/binaries of the PEAS Suite should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own networks and/or with the network owner's permission. diff --git a/winPEAS/winPEASexe/README.md b/winPEAS/winPEASexe/README.md index fbbe5d3..e9c8590 100755 --- a/winPEAS/winPEASexe/README.md +++ b/winPEAS/winPEASexe/README.md @@ -264,11 +264,6 @@ Once you have installed and activated it you need to: -## Let's improve PEASS together - -If you want to **add something** and have **any cool idea** related to this project, please let me know it in the **telegram group https://t.me/peass** or using **[github issues](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/issues)** and we will update the master version. - - ## TODO - Add more checks - Mantain updated Watson (last JAN 2021)