diff --git a/README.md b/README.md index 8d1f9a8..d193e5d 100755 --- a/README.md +++ b/README.md @@ -20,6 +20,10 @@ If you want to **add something** and have **any cool idea** related to this proj [![paypal](https://www.paypalobjects.com/en_US/i/btn/btn_donateCC_LG.gif)](https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=DED2HWDYLFT2C&source=url) +## Looking for a useful Privilege Escalation Course? + +Contact me and ask about the **Privilege Escalation Course** I am preparing for attackers and defenders (**100% technical**). + ## License MIT License diff --git a/linPEAS/README.md b/linPEAS/README.md index e2a3182..3a3f33e 100755 --- a/linPEAS/README.md +++ b/linPEAS/README.md @@ -228,6 +228,10 @@ If you want to **add something** and have **any cool idea** related to this proj [![paypal](https://www.paypalobjects.com/en_US/i/btn/btn_donateCC_LG.gif)](https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=DED2HWDYLFT2C&source=url) +## Looking for a useful Privilege Escalation Course? + +Contact me and ask about the **Privilege Escalation Course** I am preparing for attackers and defenders (**100% technical**). + ## TODO - Add more checks diff --git a/winPEAS/README.md b/winPEAS/README.md index d454585..a2cc319 100755 --- a/winPEAS/README.md +++ b/winPEAS/README.md @@ -18,6 +18,10 @@ If you want to **add something** and have **any cool idea** related to this proj [![paypal](https://www.paypalobjects.com/en_US/i/btn/btn_donateCC_LG.gif)](https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=DED2HWDYLFT2C&source=url) +## Looking for a useful Privilege Escalation Course? + +Contact me and ask about the **Privilege Escalation Course** I am preparing for attackers and defenders (**100% technical**). + ## License MIT License diff --git a/winPEAS/winPEASbat/README.md b/winPEAS/winPEASbat/README.md index edd6126..026aad2 100755 --- a/winPEAS/winPEASbat/README.md +++ b/winPEAS/winPEASbat/README.md @@ -128,6 +128,10 @@ If you want to **add something** and have **any cool idea** related to this proj [![paypal](https://www.paypalobjects.com/en_US/i/btn/btn_donateCC_LG.gif)](https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=DED2HWDYLFT2C&source=url) +## Looking for a useful Privilege Escalation Course? + +Contact me and ask about the **Privilege Escalation Course** I am preparing for attackers and defenders (**100% technical**). + ## License MIT License diff --git a/winPEAS/winPEASexe/.vs/winPEAS/v16/.suo b/winPEAS/winPEASexe/.vs/winPEAS/v16/.suo index c4e387f..aefcad9 100755 Binary files a/winPEAS/winPEASexe/.vs/winPEAS/v16/.suo and b/winPEAS/winPEASexe/.vs/winPEAS/v16/.suo differ diff --git a/winPEAS/winPEASexe/.vs/winPEAS/v16/Server/sqlite3/storage.ide b/winPEAS/winPEASexe/.vs/winPEAS/v16/Server/sqlite3/storage.ide index 69b2e85..d7ecd52 100755 Binary files a/winPEAS/winPEASexe/.vs/winPEAS/v16/Server/sqlite3/storage.ide and b/winPEAS/winPEASexe/.vs/winPEAS/v16/Server/sqlite3/storage.ide differ diff --git a/winPEAS/winPEASexe/README.md b/winPEAS/winPEASexe/README.md index 31ea2d2..ac05738 100755 --- a/winPEAS/winPEASexe/README.md +++ b/winPEAS/winPEASexe/README.md @@ -6,11 +6,13 @@ Check also the **Local Windows Privilege Escalation checklist** from **[book.hacktricks.xyz](https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation)** +[![youtube]((https://github.com/carlospolop/privilege-escalation-awesome-script-suite/raw/master/winPEAS/winPEASexe/images/screen.png)](https://youtu.be/66gOwXMnxRI) + ## Quick Start Download the **[latest version from here](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/tree/master/winPEAS/winPEASexe/winPEAS/bin)** or **compile it yourself**. ```bash -winpeas.exe ansi #ANSI color for linux consoles (reverse shell) +winpeas.exe ansi cmd searchfast #ANSI color for linux consoles (reverse shell), cmd commands and avoid sleepig winpeas.exe #Will execute all checks except the ones that execute MD commands winpeas.exe cmd #All checks winpeas.exe cmd fast #All except the one that search for files @@ -21,7 +23,9 @@ winpeas.exe systeminfo userinfo #Only systeminfo and userinfo checks executed The goal of this project is to search for possible **Privilege Escalation Paths** in Windows environments. -It should take only a **few seconds** to execute almost all the checks and **some minutes searching in the whole main drive** for known files that could contain passwords (the time depened on the number of files in your drive). Get rif of that time consuming check using the parameter `fast`. +It should take only a **few seconds** to execute almost all the checks and **some minutes searching in the whole main drive** for known files that could contain passwords (the time depened on the number of files in your drive). Get rid of that time consuming check using the parameter `fast`. + +By default, the progam **sleeps 150ms** before start searching files in each directory. This is made to consume less resources (**stealthier**). You can **avoid this sleep using `searchfast` parameter**. The **ouput will be colored**. Below you have some indications about what does each color means exacty, but keep in mind that **Red** is for something interesting (from a pentester perspective) and **Green** is something good (from a defender perspective). @@ -129,6 +133,10 @@ If you want to **add something** and have **any cool idea** related to this proj [![paypal](https://www.paypalobjects.com/en_US/i/btn/btn_donateCC_LG.gif)](https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=DED2HWDYLFT2C&source=url) +## Looking for a useful Privilege Escalation Course? + +Contact me and ask about the **Privilege Escalation Course** I am preparing for attackers and defenders (**100% technical**). + ## TODO - Add more checks diff --git a/winPEAS/winPEASexe/images/colors.png b/winPEAS/winPEASexe/images/colors.png index 7e43408..62a4ca2 100755 Binary files a/winPEAS/winPEASexe/images/colors.png and b/winPEAS/winPEASexe/images/colors.png differ diff --git a/winPEAS/winPEASexe/images/help.png b/winPEAS/winPEASexe/images/help.png index d57c7fe..fbe0c56 100755 Binary files a/winPEAS/winPEASexe/images/help.png and b/winPEAS/winPEASexe/images/help.png differ diff --git a/winPEAS/winPEASexe/images/screen.png b/winPEAS/winPEASexe/images/screen.png new file mode 100755 index 0000000..f0f92ab Binary files /dev/null and b/winPEAS/winPEASexe/images/screen.png differ diff --git a/winPEAS/winPEASexe/winPEAS/Beaprint.cs b/winPEAS/winPEASexe/winPEAS/Beaprint.cs index 11a6d22..0216fda 100755 --- a/winPEAS/winPEASexe/winPEAS/Beaprint.cs +++ b/winPEAS/winPEASexe/winPEAS/Beaprint.cs @@ -3,6 +3,7 @@ using System; using System.Collections.Generic; using System.Drawing; using System.Text.RegularExpressions; +using System.Threading; namespace winPEAS { @@ -49,38 +50,39 @@ namespace winPEAS public static void PrintBanner() { - System.Console.WriteLine(@" - *((,.,/((((((((((((((((((((/, */ - ,/*,..*(((((((((((((((((((((((((((((((((, ,/ -.,*/((((((((((((((((((/, .*//((//**, .*((((((* ./, -(((((((((((((((((* .****,,,/((##########(* ,((((((* ( -((((((((((((/* .***************,,/(########(. ((((((* *, -,.. ...,****************(@@@#(/***/(#####* /((((((./ -,,,..**********************&@@@#@@@@@(***,.*(###* /(((((*. -,, ,**********************#@@&(#%@@@%*********,,((/ /((((( -,. ...........,,*********/%@@&&@@@@@/*************,,..(((( -,,**(################(/*****//&@@@@%****************** /(( -.**(########################(/,.,/(/*******************.*( -.*/(#############################(/*********************,* -,*/(##################################(/*****************. -,*((######################################(**************. -.*((######(,.***.,(###################(..***(/***********. -.,/(######*(#####((##################((######/(**********. -,.*/##################(/**********(################(*****. -,.,*(####################/*******(####################((/. -,, **((############################################/ /(( -,,, ,*((#########################################(..(((((( -. .. ,**/(#####################################( .(((((((( -(((((* ,(#################################((* /((((((((( -((((((((((. ,(############################(../(((((((((( - (((((((((/, ,####################(/..(((((((((( - (((((((((/,. ,*//////*,. ./((((((((((( - ((((((((((((((((((((((((((((/"); + Colorful.Console.WriteLine(@" + *((,.,/((((((((((((((((((((/, */ + ,/*,..*(((((((((((((((((((((((((((((((((, +,*/((((((((((((((((((/, .*//((//**, .*((((((* +((((((((((((((((* *****,,,/########## .(* ,(((((( +(((((((((((/* ******************/####### .(. (((((( +((((((..******************/@@@@@/***/######* /(((((( +,,..**********************&@@@@@@@@@(***,#### ../((((( +, ,**********************#@@&@@%@@@%*********##((/ /(((( +..(((##########*********/%@@@@@@@@@/*************,,..(((( +.(((################(/******/&@@@@%****************.. /(( +.((########################(/************************..*( +.((#############################(/********************.,( +.((##################################(/***************..( +.((######################################(************..( +.((######(,.***.,(###################(..***(/*********..( +.((######*(#####((##################((######/(********..( +.((##################(/**********(################(**...( +.(((####################/*******(###################.(((( +.(((((############################################/ /(( +..(((((#########################################(..(((((. +....(((((#####################################( .((((((. +......(((((#################################( .(((((((. +(((((((((. ,(############################(../(((((((((. + (((((((((/, ,####################(/..((((((((((. + (((((((((/,. ,*//////*,. ./(((((((((((. + (((((((((((((((((((((((((((/", color_default); + + Thread.Sleep(700); } public static void PrintInit() { - Colorful.Console.WriteLine(); if (Program.banner) PrintBanner(); @@ -98,6 +100,8 @@ namespace winPEAS Colorful.Console.WriteLineFormatted("{0} {1} by carlospolop", Color.Yellow, colorsString); } + Colorful.Console.WriteLine(); + LinkPrint("https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation", "You can find a Windows local PE Checklist here:"); PrintLeyend(); } @@ -133,8 +137,9 @@ namespace winPEAS { System.Console.WriteLine(YELLOW + " [*] " + GREEN + "WinPEAS is a binary to enumerate possible paths to escalate privileges locally" + NOCOLOR); System.Console.WriteLine(LBLUE + "\tquiet" + GRAY + " Do not print banner" + NOCOLOR); - System.Console.WriteLine(LBLUE + "\tansi" + GRAY + " Use ansi colors (see color from linux terminal)" + NOCOLOR); - System.Console.WriteLine(LBLUE + "\tfast" + GRAY + " This will avoid very time consuming checks" + NOCOLOR); + System.Console.WriteLine(LBLUE + "\tansi" + GRAY + " Use ansi colors (see color from linux terminal)" + NOCOLOR); + System.Console.WriteLine(LBLUE + "\tsearchfast" + GRAY + " Avoid sleeping while searching files (notable amount of resources)" + NOCOLOR); + System.Console.WriteLine(LBLUE + "\tfast" + GRAY + " Avoid very time consuming checks" + NOCOLOR); System.Console.WriteLine(LBLUE + "\tcmd" + GRAY + " Obtain wifi, cred manager and clipboard information executing CMD commands" + NOCOLOR); System.Console.WriteLine(LBLUE + "\tsysteminfo" + GRAY + " Search system information" + NOCOLOR); System.Console.WriteLine(LBLUE + "\tuserinfo" + GRAY + " Search user information" + NOCOLOR); @@ -151,8 +156,9 @@ namespace winPEAS { Colorful.Console.Write(" [*] ", Color.Yellow); Colorful.Console.WriteLine("WinPEAS is a binary to enumerate possible paths to escalate privileges locally", color_key); Colorful.Console.Write("\tquiet", color_default); Colorful.Console.WriteLine(" Do not print banner", Color.Gray); - Colorful.Console.Write("\tansi", color_default); Colorful.Console.WriteLine(" Use ansi colors (see color from linux terminal)", Color.Gray); - Colorful.Console.Write("\tfast", color_default); Colorful.Console.WriteLine(" This will avoid very time consuming checks", Color.Gray); + Colorful.Console.Write("\tansi", color_default); Colorful.Console.WriteLine(" Use ansi colors (see color from linux terminal)", Color.Gray); + Colorful.Console.Write("\tsearchfast", color_default); Colorful.Console.WriteLine(" Avoid sleeping while searching files (notable amount of resources)", Color.Gray); + Colorful.Console.Write("\tfast", color_default); Colorful.Console.WriteLine(" Avoid very time consuming checks", Color.Gray); Colorful.Console.Write("\tcmd", color_default); Colorful.Console.WriteLine(" Obtain wifi, cred manager and clipboard information executing CMD commands", Color.Gray); Colorful.Console.Write("\tsysteminfo", color_default); Colorful.Console.WriteLine(" Search system information", Color.Gray); Colorful.Console.Write("\tuserinfo", color_default); Colorful.Console.WriteLine(" Search user information", Color.Gray); diff --git a/winPEAS/winPEASexe/winPEAS/MyUtils.cs b/winPEAS/winPEASexe/winPEAS/MyUtils.cs index 3584279..7af3611 100755 --- a/winPEAS/winPEASexe/winPEAS/MyUtils.cs +++ b/winPEAS/winPEASexe/winPEAS/MyUtils.cs @@ -10,6 +10,7 @@ using System.Reflection; using System.Security.AccessControl; using System.Runtime.InteropServices; using Colorful; +using System.Threading; namespace winPEAS { @@ -334,7 +335,7 @@ namespace winPEAS // with a file and is the combination of all rights in this enumeration. int FullControl = 2032127; - int[] permissions = { FullControl, TakeOwnership, ChangePermissions, Modify, Delete, Write, WriteAttributes, WriteExtendedAttributes, AppendData, WriteData }; + int[] permissions = { FullControl, TakeOwnership, ChangePermissions, Modify, Write, WriteData, Delete, WriteAttributes, WriteExtendedAttributes, AppendData }; try { FileSecurity fSecurity = File.GetAccessControl(path); @@ -349,8 +350,12 @@ namespace winPEAS { if ((perm & current_right) == perm) { - results.Add(String.Format("{0} [{1}]", rule.IdentityReference.Value, rule.FileSystemRights)); - break; + string to_add = String.Format("{0} [{1}]", rule.IdentityReference.Value, rule.FileSystemRights); + if (!results.Contains(to_add)) + { + results.Add(to_add); + break; + } } } } @@ -395,20 +400,20 @@ namespace winPEAS return results; Dictionary interesting_perms = new Dictionary() - { - { "WriteData", (int)FileSystemRights.WriteData }, - { "AppendData", (int)FileSystemRights.AppendData }, - { "WriteExtendedAttributes", (int)FileSystemRights.WriteExtendedAttributes }, - { "WriteAttributes", (int)FileSystemRights.WriteAttributes }, - { "Write", (int)FileSystemRights.Write }, - { "Delete", (int)FileSystemRights.Delete }, - { "Modify", (int)FileSystemRights.Modify }, - { "ChangePermissions", (int)FileSystemRights.ChangePermissions }, - { "TakeOwnership", (int)FileSystemRights.TakeOwnership }, - { "FullControl", (int)FileSystemRights.FullControl }, - { "GenericAll", 268435456}, - { "GenericWrite", 1073741824 } - }; + { + { "GenericAll", 268435456}, + { "FullControl", (int)FileSystemRights.FullControl }, + { "TakeOwnership", (int)FileSystemRights.TakeOwnership }, + { "GenericWrite", 1073741824 }, + { "WriteData", (int)FileSystemRights.WriteData }, + { "Modify", (int)FileSystemRights.Modify }, + { "Write", (int)FileSystemRights.Write }, + { "ChangePermissions", (int)FileSystemRights.ChangePermissions }, + { "Delete", (int)FileSystemRights.Delete }, + { "AppendData", (int)FileSystemRights.AppendData }, + { "WriteAttributes", (int)FileSystemRights.WriteAttributes }, + { "WriteExtendedAttributes", (int)FileSystemRights.WriteExtendedAttributes }, + }; FileSecurity fSecurity = File.GetAccessControl(path); //Go through the rules returned from the DirectorySecurity @@ -426,8 +431,12 @@ namespace winPEAS { if ((entry.Value & current_right) == entry.Value) { - results.Add(String.Format("{0} [{1}]", rule.IdentityReference.Value, entry.Key)); - break; + string to_add = String.Format("{0} [{1}]", rule.IdentityReference.Value, entry.Key); + if (!results.Contains(to_add)) + { + results.Add(to_add); + break; + } } } } @@ -560,6 +569,9 @@ namespace winPEAS Colorful.Console.WriteLineStyled(String.Join("\n", Directory.GetFiles(path, pattern, SearchOption.TopDirectoryOnly).Where(filepath => !filepath.Contains(".dll"))), ss); // .exe can be contained because of appcmd.exe } + if (!Program.search_fast) + Thread.Sleep(Program.search_time); + // go recurse in all sub-directories foreach (var directory in Directory.GetDirectories(path)) FindFiles(directory, patterns, ss, color); diff --git a/winPEAS/winPEASexe/winPEAS/Program.cs b/winPEAS/winPEASexe/winPEAS/Program.cs index 5c118c4..5f0a0ad 100755 --- a/winPEAS/winPEASexe/winPEAS/Program.cs +++ b/winPEAS/winPEASexe/winPEAS/Program.cs @@ -9,8 +9,10 @@ namespace winPEAS { class Program { - public static bool banner = true; public static string version = "vBETA VERSION"; + public static bool banner = true; + public static bool search_fast = false; + public static int search_time = 150; static bool is_fast = false; static bool exec_cmd = false; public static bool using_ansi = false; @@ -568,7 +570,7 @@ namespace winPEAS if (autologon.Count > 0) { foreach (KeyValuePair entry in autologon) { - if (entry.Value != null && entry.Value != "") + if (!String.IsNullOrEmpty(entry.Value)) { if (!ban) { @@ -580,9 +582,9 @@ namespace winPEAS else Colorful.Console.WriteLineStyled(String.Format(" {0,-30}: {1}", entry.Key, entry.Value), CreateUsersSS()); } - else - Beaprint.NotFoundPrint(); } + if (!ban) + Beaprint.NotFoundPrint(); } else Beaprint.NotFoundPrint(); @@ -930,7 +932,7 @@ namespace winPEAS Beaprint.MainPrint("Installed Applications --Via Program Files--", "T1083&T1012&T1010&T1518"); Beaprint.LinkPrint("https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#software", "Check if you can modify installed software"); Dictionary> InstalledAppsPerms = ApplicationInfo.GetInstalledAppsPerms(); - string format = " ==> {0}({1})"; + string format = " ==> {0} ({1})"; foreach (KeyValuePair> app in InstalledAppsPerms) { if (String.IsNullOrEmpty(app.Value.ToString())) //If empty, nothing found, is good @@ -1677,7 +1679,7 @@ namespace winPEAS string using_HKLM_WSUS = MyUtils.GetRegValue("HKLM", path, "UseWUServer"); if (HKLM_WSUS.Contains("http://")) { - Beaprint.BadPrint(" WSUS is using http!"); + Beaprint.BadPrint(" WSUS is using http: " + HKLM_WSUS); Beaprint.InfoPrint("You can test https://github.com/pimps/wsuxploit to escalate privileges"); if (using_HKLM_WSUS == "1") Beaprint.BadPrint(" And UseWUServer is equals to 1, so it is vulnerable!"); @@ -2260,6 +2262,9 @@ namespace winPEAS if (string.Equals(arg, "quiet", StringComparison.CurrentCultureIgnoreCase)) banner = false; + if (string.Equals(arg, "searchfast", StringComparison.CurrentCultureIgnoreCase)) + search_fast = false; + if (string.Equals(arg, "help", StringComparison.CurrentCultureIgnoreCase)) { Beaprint.PrintUsage(); diff --git a/winPEAS/winPEASexe/winPEAS/UserInfo.cs b/winPEAS/winPEASexe/winPEAS/UserInfo.cs index ee70798..54d43d0 100755 --- a/winPEAS/winPEASexe/winPEAS/UserInfo.cs +++ b/winPEAS/winPEASexe/winPEAS/UserInfo.cs @@ -296,7 +296,7 @@ namespace winPEAS } else if (fullInfo) { - string userLine = user["Caption"] + ((string)user["Fullname"] != "false" ? "" : " (" + user["Fullname"] + ")") + ((bool)user["Disabled"] ? "(Disabled)" : "") + ((bool)user["Lockout"] ? "(Lockout)" : "") + (((string)user["Description"]).Length > 1 ? ": " + user["Description"] : ""); + string userLine = user["Caption"] + ((bool)user["Disabled"] ? "(Disabled)" : "") + ((bool)user["Lockout"] ? "(Lockout)" : "") + ((string)user["Fullname"] != "false" ? "" : "(" + user["Fullname"] + ")") + (((string)user["Description"]).Length > 1 ? ": " + user["Description"] : ""); List user_groups = GetUserGroups((string)user["Name"]); string groupsLine = ""; if (user_groups.Count > 0) diff --git a/winPEAS/winPEASexe/winPEAS/Watson.cs b/winPEAS/winPEASexe/winPEAS/Watson.cs index 7d855b1..70dcfe9 100755 --- a/winPEAS/winPEASexe/winPEAS/Watson.cs +++ b/winPEAS/winPEASexe/winPEAS/Watson.cs @@ -100,10 +100,10 @@ namespace winPEAS { foreach (Vulnerability vuln in _vulnerabilities.Where(i => i.Vulnerable)) { - Beaprint.BadPrint(String.Format(" [!] {0} : VULNERABLE", vuln.Identification)); + Beaprint.BadPrint(String.Format(" [!] {0} : VULNERABLE", vuln.Identification)); foreach (string exploit in vuln.KnownExploits) - Beaprint.BadPrint(String.Format(" [>] {0}", exploit)); + Beaprint.BadPrint(String.Format(" [>] {0}", exploit)); System.Console.WriteLine(); } diff --git a/winPEAS/winPEASexe/winPEAS/bin/Release/winPEAS.exe b/winPEAS/winPEASexe/winPEAS/bin/Release/winPEAS.exe index 4369da1..7a993a5 100755 Binary files a/winPEAS/winPEASexe/winPEAS/bin/Release/winPEAS.exe and b/winPEAS/winPEASexe/winPEAS/bin/Release/winPEAS.exe differ diff --git a/winPEAS/winPEASexe/winPEAS/bin/Release/winPEAS.pdb b/winPEAS/winPEASexe/winPEAS/bin/Release/winPEAS.pdb index eb151af..52a6af3 100755 Binary files a/winPEAS/winPEASexe/winPEAS/bin/Release/winPEAS.pdb and b/winPEAS/winPEASexe/winPEAS/bin/Release/winPEAS.pdb differ diff --git a/winPEAS/winPEASexe/winPEAS/bin/x64/Release/winPEAS.exe b/winPEAS/winPEASexe/winPEAS/bin/x64/Release/winPEAS.exe index e9740e3..c5cddaa 100755 Binary files a/winPEAS/winPEASexe/winPEAS/bin/x64/Release/winPEAS.exe and b/winPEAS/winPEASexe/winPEAS/bin/x64/Release/winPEAS.exe differ diff --git a/winPEAS/winPEASexe/winPEAS/bin/x64/Release/winPEAS.pdb b/winPEAS/winPEASexe/winPEAS/bin/x64/Release/winPEAS.pdb index a67a4d5..bc76508 100755 Binary files a/winPEAS/winPEASexe/winPEAS/bin/x64/Release/winPEAS.pdb and b/winPEAS/winPEASexe/winPEAS/bin/x64/Release/winPEAS.pdb differ diff --git a/winPEAS/winPEASexe/winPEAS/bin/x86/Release/winPEAS.exe b/winPEAS/winPEASexe/winPEAS/bin/x86/Release/winPEAS.exe index cdc6efb..48514a0 100755 Binary files a/winPEAS/winPEASexe/winPEAS/bin/x86/Release/winPEAS.exe and b/winPEAS/winPEASexe/winPEAS/bin/x86/Release/winPEAS.exe differ diff --git a/winPEAS/winPEASexe/winPEAS/bin/x86/Release/winPEAS.pdb b/winPEAS/winPEASexe/winPEAS/bin/x86/Release/winPEAS.pdb index 08f4c28..acb9181 100755 Binary files a/winPEAS/winPEASexe/winPEAS/bin/x86/Release/winPEAS.pdb and b/winPEAS/winPEASexe/winPEAS/bin/x86/Release/winPEAS.pdb differ diff --git a/winPEAS/winPEASexe/winPEAS/obj/Release/winPEAS.csproj.FileListAbsolute.txt b/winPEAS/winPEASexe/winPEAS/obj/Release/winPEAS.csproj.FileListAbsolute.txt index 078be69..ae81770 100755 --- a/winPEAS/winPEASexe/winPEAS/obj/Release/winPEAS.csproj.FileListAbsolute.txt +++ b/winPEAS/winPEASexe/winPEAS/obj/Release/winPEAS.csproj.FileListAbsolute.txt @@ -34,8 +34,8 @@ D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\b D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\bin\Release\winPEAS.exe D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\bin\Release\winPEAS.pdb D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\bin\Release\Microsoft.Win32.TaskScheduler.xml -D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\obj\Release\winPEAS.csprojAssemblyReference.cache D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\obj\Release\winPEAS.csproj.Fody.CopyLocal.cache D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\obj\Release\winPEAS.csproj.CopyComplete D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\obj\Release\winPEAS.exe D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\obj\Release\winPEAS.pdb +D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\obj\Release\winPEAS.csprojAssemblyReference.cache diff --git a/winPEAS/winPEASexe/winPEAS/obj/Release/winPEAS.csprojAssemblyReference.cache b/winPEAS/winPEASexe/winPEAS/obj/Release/winPEAS.csprojAssemblyReference.cache index fcb839c..9bd52ce 100755 Binary files a/winPEAS/winPEASexe/winPEAS/obj/Release/winPEAS.csprojAssemblyReference.cache and b/winPEAS/winPEASexe/winPEAS/obj/Release/winPEAS.csprojAssemblyReference.cache differ diff --git a/winPEAS/winPEASexe/winPEAS/obj/Release/winPEAS.exe b/winPEAS/winPEASexe/winPEAS/obj/Release/winPEAS.exe index 4369da1..7a993a5 100755 Binary files a/winPEAS/winPEASexe/winPEAS/obj/Release/winPEAS.exe and b/winPEAS/winPEASexe/winPEAS/obj/Release/winPEAS.exe differ diff --git a/winPEAS/winPEASexe/winPEAS/obj/Release/winPEAS.pdb b/winPEAS/winPEASexe/winPEAS/obj/Release/winPEAS.pdb index eb151af..52a6af3 100755 Binary files a/winPEAS/winPEASexe/winPEAS/obj/Release/winPEAS.pdb and b/winPEAS/winPEASexe/winPEAS/obj/Release/winPEAS.pdb differ diff --git a/winPEAS/winPEASexe/winPEAS/obj/x64/Release/winPEAS.exe b/winPEAS/winPEASexe/winPEAS/obj/x64/Release/winPEAS.exe index e9740e3..c5cddaa 100755 Binary files a/winPEAS/winPEASexe/winPEAS/obj/x64/Release/winPEAS.exe and b/winPEAS/winPEASexe/winPEAS/obj/x64/Release/winPEAS.exe differ diff --git a/winPEAS/winPEASexe/winPEAS/obj/x64/Release/winPEAS.pdb b/winPEAS/winPEASexe/winPEAS/obj/x64/Release/winPEAS.pdb index a67a4d5..bc76508 100755 Binary files a/winPEAS/winPEASexe/winPEAS/obj/x64/Release/winPEAS.pdb and b/winPEAS/winPEASexe/winPEAS/obj/x64/Release/winPEAS.pdb differ diff --git a/winPEAS/winPEASexe/winPEAS/obj/x86/Release/winPEAS.csproj.FileListAbsolute.txt b/winPEAS/winPEASexe/winPEAS/obj/x86/Release/winPEAS.csproj.FileListAbsolute.txt index 251f481..620060d 100755 --- a/winPEAS/winPEASexe/winPEAS/obj/x86/Release/winPEAS.csproj.FileListAbsolute.txt +++ b/winPEAS/winPEASexe/winPEAS/obj/x86/Release/winPEAS.csproj.FileListAbsolute.txt @@ -14,3 +14,4 @@ D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\o D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\obj\x86\Release\winPEAS.csproj.CopyComplete D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\obj\x86\Release\winPEAS.exe D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\obj\x86\Release\winPEAS.pdb +D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\obj\x86\Release\winPEAS.csprojAssemblyReference.cache diff --git a/winPEAS/winPEASexe/winPEAS/obj/x86/Release/winPEAS.csprojAssemblyReference.cache b/winPEAS/winPEASexe/winPEAS/obj/x86/Release/winPEAS.csprojAssemblyReference.cache new file mode 100755 index 0000000..d0ea321 Binary files /dev/null and b/winPEAS/winPEASexe/winPEAS/obj/x86/Release/winPEAS.csprojAssemblyReference.cache differ diff --git a/winPEAS/winPEASexe/winPEAS/obj/x86/Release/winPEAS.exe b/winPEAS/winPEASexe/winPEAS/obj/x86/Release/winPEAS.exe index cdc6efb..48514a0 100755 Binary files a/winPEAS/winPEASexe/winPEAS/obj/x86/Release/winPEAS.exe and b/winPEAS/winPEASexe/winPEAS/obj/x86/Release/winPEAS.exe differ diff --git a/winPEAS/winPEASexe/winPEAS/obj/x86/Release/winPEAS.pdb b/winPEAS/winPEASexe/winPEAS/obj/x86/Release/winPEAS.pdb index 08f4c28..acb9181 100755 Binary files a/winPEAS/winPEASexe/winPEAS/obj/x86/Release/winPEAS.pdb and b/winPEAS/winPEASexe/winPEAS/obj/x86/Release/winPEAS.pdb differ