video
This commit is contained in:
parent
45995cd200
commit
b5f6096045
@ -20,6 +20,10 @@ If you want to **add something** and have **any cool idea** related to this proj
|
||||
|
||||
[](https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=DED2HWDYLFT2C&source=url)
|
||||
|
||||
## Looking for a useful Privilege Escalation Course?
|
||||
|
||||
Contact me and ask about the **Privilege Escalation Course** I am preparing for attackers and defenders (**100% technical**).
|
||||
|
||||
## License
|
||||
|
||||
MIT License
|
||||
|
@ -228,6 +228,10 @@ If you want to **add something** and have **any cool idea** related to this proj
|
||||
|
||||
[](https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=DED2HWDYLFT2C&source=url)
|
||||
|
||||
## Looking for a useful Privilege Escalation Course?
|
||||
|
||||
Contact me and ask about the **Privilege Escalation Course** I am preparing for attackers and defenders (**100% technical**).
|
||||
|
||||
## TODO
|
||||
|
||||
- Add more checks
|
||||
|
@ -18,6 +18,10 @@ If you want to **add something** and have **any cool idea** related to this proj
|
||||
|
||||
[](https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=DED2HWDYLFT2C&source=url)
|
||||
|
||||
## Looking for a useful Privilege Escalation Course?
|
||||
|
||||
Contact me and ask about the **Privilege Escalation Course** I am preparing for attackers and defenders (**100% technical**).
|
||||
|
||||
## License
|
||||
|
||||
MIT License
|
||||
|
@ -128,6 +128,10 @@ If you want to **add something** and have **any cool idea** related to this proj
|
||||
|
||||
[](https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=DED2HWDYLFT2C&source=url)
|
||||
|
||||
## Looking for a useful Privilege Escalation Course?
|
||||
|
||||
Contact me and ask about the **Privilege Escalation Course** I am preparing for attackers and defenders (**100% technical**).
|
||||
|
||||
## License
|
||||
|
||||
MIT License
|
||||
|
Binary file not shown.
Binary file not shown.
@ -6,11 +6,13 @@
|
||||
|
||||
Check also the **Local Windows Privilege Escalation checklist** from **[book.hacktricks.xyz](https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation)**
|
||||
|
||||
[](https://youtu.be/66gOwXMnxRI)
|
||||
|
||||
## Quick Start
|
||||
|
||||
Download the **[latest version from here](https://github.com/carlospolop/privilege-escalation-awesome-script-suite/tree/master/winPEAS/winPEASexe/winPEAS/bin)** or **compile it yourself**.
|
||||
```bash
|
||||
winpeas.exe ansi #ANSI color for linux consoles (reverse shell)
|
||||
winpeas.exe ansi cmd searchfast #ANSI color for linux consoles (reverse shell), cmd commands and avoid sleepig
|
||||
winpeas.exe #Will execute all checks except the ones that execute MD commands
|
||||
winpeas.exe cmd #All checks
|
||||
winpeas.exe cmd fast #All except the one that search for files
|
||||
@ -21,7 +23,9 @@ winpeas.exe systeminfo userinfo #Only systeminfo and userinfo checks executed
|
||||
|
||||
The goal of this project is to search for possible **Privilege Escalation Paths** in Windows environments.
|
||||
|
||||
It should take only a **few seconds** to execute almost all the checks and **some minutes searching in the whole main drive** for known files that could contain passwords (the time depened on the number of files in your drive). Get rif of that time consuming check using the parameter `fast`.
|
||||
It should take only a **few seconds** to execute almost all the checks and **some minutes searching in the whole main drive** for known files that could contain passwords (the time depened on the number of files in your drive). Get rid of that time consuming check using the parameter `fast`.
|
||||
|
||||
By default, the progam **sleeps 150ms** before start searching files in each directory. This is made to consume less resources (**stealthier**). You can **avoid this sleep using `searchfast` parameter**.
|
||||
|
||||
The **ouput will be colored**. Below you have some indications about what does each color means exacty, but keep in mind that **Red** is for something interesting (from a pentester perspective) and **Green** is something good (from a defender perspective).
|
||||
|
||||
@ -129,6 +133,10 @@ If you want to **add something** and have **any cool idea** related to this proj
|
||||
|
||||
[](https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=DED2HWDYLFT2C&source=url)
|
||||
|
||||
## Looking for a useful Privilege Escalation Course?
|
||||
|
||||
Contact me and ask about the **Privilege Escalation Course** I am preparing for attackers and defenders (**100% technical**).
|
||||
|
||||
## TODO
|
||||
|
||||
- Add more checks
|
||||
|
Binary file not shown.
Before Width: | Height: | Size: 108 KiB After Width: | Height: | Size: 114 KiB |
Binary file not shown.
Before Width: | Height: | Size: 157 KiB After Width: | Height: | Size: 148 KiB |
BIN
winPEAS/winPEASexe/images/screen.png
Executable file
BIN
winPEAS/winPEASexe/images/screen.png
Executable file
Binary file not shown.
After Width: | Height: | Size: 325 KiB |
@ -3,6 +3,7 @@ using System;
|
||||
using System.Collections.Generic;
|
||||
using System.Drawing;
|
||||
using System.Text.RegularExpressions;
|
||||
using System.Threading;
|
||||
|
||||
namespace winPEAS
|
||||
{
|
||||
@ -49,38 +50,39 @@ namespace winPEAS
|
||||
|
||||
public static void PrintBanner()
|
||||
{
|
||||
System.Console.WriteLine(@"
|
||||
*((,.,/((((((((((((((((((((/, */
|
||||
,/*,..*(((((((((((((((((((((((((((((((((, ,/
|
||||
.,*/((((((((((((((((((/, .*//((//**, .*((((((* ./,
|
||||
(((((((((((((((((* .****,,,/((##########(* ,((((((* (
|
||||
((((((((((((/* .***************,,/(########(. ((((((* *,
|
||||
,.. ...,****************(@@@#(/***/(#####* /((((((./
|
||||
,,,..**********************&@@@#@@@@@(***,.*(###* /(((((*.
|
||||
,, ,**********************#@@&(#%@@@%*********,,((/ /(((((
|
||||
,. ...........,,*********/%@@&&@@@@@/*************,,..((((
|
||||
,,**(################(/*****//&@@@@%****************** /((
|
||||
.**(########################(/,.,/(/*******************.*(
|
||||
.*/(#############################(/*********************,*
|
||||
,*/(##################################(/*****************.
|
||||
,*((######################################(**************.
|
||||
.*((######(,.***.,(###################(..***(/***********.
|
||||
.,/(######*(#####((##################((######/(**********.
|
||||
,.*/##################(/**********(################(*****.
|
||||
,.,*(####################/*******(####################((/.
|
||||
,, **((############################################/ /((
|
||||
,,, ,*((#########################################(..((((((
|
||||
. .. ,**/(#####################################( .((((((((
|
||||
(((((* ,(#################################((* /(((((((((
|
||||
((((((((((. ,(############################(../((((((((((
|
||||
(((((((((/, ,####################(/..((((((((((
|
||||
(((((((((/,. ,*//////*,. ./(((((((((((
|
||||
((((((((((((((((((((((((((((/");
|
||||
Colorful.Console.WriteLine(@"
|
||||
*((,.,/((((((((((((((((((((/, */
|
||||
,/*,..*(((((((((((((((((((((((((((((((((,
|
||||
,*/((((((((((((((((((/, .*//((//**, .*((((((*
|
||||
((((((((((((((((* *****,,,/########## .(* ,((((((
|
||||
(((((((((((/* ******************/####### .(. ((((((
|
||||
((((((..******************/@@@@@/***/######* /((((((
|
||||
,,..**********************&@@@@@@@@@(***,#### ../(((((
|
||||
, ,**********************#@@&@@%@@@%*********##((/ /((((
|
||||
..(((##########*********/%@@@@@@@@@/*************,,..((((
|
||||
.(((################(/******/&@@@@%****************.. /((
|
||||
.((########################(/************************..*(
|
||||
.((#############################(/********************.,(
|
||||
.((##################################(/***************..(
|
||||
.((######################################(************..(
|
||||
.((######(,.***.,(###################(..***(/*********..(
|
||||
.((######*(#####((##################((######/(********..(
|
||||
.((##################(/**********(################(**...(
|
||||
.(((####################/*******(###################.((((
|
||||
.(((((############################################/ /((
|
||||
..(((((#########################################(..(((((.
|
||||
....(((((#####################################( .((((((.
|
||||
......(((((#################################( .(((((((.
|
||||
(((((((((. ,(############################(../(((((((((.
|
||||
(((((((((/, ,####################(/..((((((((((.
|
||||
(((((((((/,. ,*//////*,. ./(((((((((((.
|
||||
(((((((((((((((((((((((((((/", color_default);
|
||||
|
||||
Thread.Sleep(700);
|
||||
}
|
||||
|
||||
public static void PrintInit()
|
||||
{
|
||||
Colorful.Console.WriteLine();
|
||||
if (Program.banner)
|
||||
PrintBanner();
|
||||
|
||||
@ -98,6 +100,8 @@ namespace winPEAS
|
||||
|
||||
Colorful.Console.WriteLineFormatted("{0} {1} by carlospolop", Color.Yellow, colorsString);
|
||||
}
|
||||
Colorful.Console.WriteLine();
|
||||
|
||||
LinkPrint("https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation", "You can find a Windows local PE Checklist here:");
|
||||
PrintLeyend();
|
||||
}
|
||||
@ -133,8 +137,9 @@ namespace winPEAS
|
||||
{
|
||||
System.Console.WriteLine(YELLOW + " [*] " + GREEN + "WinPEAS is a binary to enumerate possible paths to escalate privileges locally" + NOCOLOR);
|
||||
System.Console.WriteLine(LBLUE + "\tquiet" + GRAY + " Do not print banner" + NOCOLOR);
|
||||
System.Console.WriteLine(LBLUE + "\tansi" + GRAY + " Use ansi colors (see color from linux terminal)" + NOCOLOR);
|
||||
System.Console.WriteLine(LBLUE + "\tfast" + GRAY + " This will avoid very time consuming checks" + NOCOLOR);
|
||||
System.Console.WriteLine(LBLUE + "\tansi" + GRAY + " Use ansi colors (see color from linux terminal)" + NOCOLOR);
|
||||
System.Console.WriteLine(LBLUE + "\tsearchfast" + GRAY + " Avoid sleeping while searching files (notable amount of resources)" + NOCOLOR);
|
||||
System.Console.WriteLine(LBLUE + "\tfast" + GRAY + " Avoid very time consuming checks" + NOCOLOR);
|
||||
System.Console.WriteLine(LBLUE + "\tcmd" + GRAY + " Obtain wifi, cred manager and clipboard information executing CMD commands" + NOCOLOR);
|
||||
System.Console.WriteLine(LBLUE + "\tsysteminfo" + GRAY + " Search system information" + NOCOLOR);
|
||||
System.Console.WriteLine(LBLUE + "\tuserinfo" + GRAY + " Search user information" + NOCOLOR);
|
||||
@ -151,8 +156,9 @@ namespace winPEAS
|
||||
{
|
||||
Colorful.Console.Write(" [*] ", Color.Yellow); Colorful.Console.WriteLine("WinPEAS is a binary to enumerate possible paths to escalate privileges locally", color_key);
|
||||
Colorful.Console.Write("\tquiet", color_default); Colorful.Console.WriteLine(" Do not print banner", Color.Gray);
|
||||
Colorful.Console.Write("\tansi", color_default); Colorful.Console.WriteLine(" Use ansi colors (see color from linux terminal)", Color.Gray);
|
||||
Colorful.Console.Write("\tfast", color_default); Colorful.Console.WriteLine(" This will avoid very time consuming checks", Color.Gray);
|
||||
Colorful.Console.Write("\tansi", color_default); Colorful.Console.WriteLine(" Use ansi colors (see color from linux terminal)", Color.Gray);
|
||||
Colorful.Console.Write("\tsearchfast", color_default); Colorful.Console.WriteLine(" Avoid sleeping while searching files (notable amount of resources)", Color.Gray);
|
||||
Colorful.Console.Write("\tfast", color_default); Colorful.Console.WriteLine(" Avoid very time consuming checks", Color.Gray);
|
||||
Colorful.Console.Write("\tcmd", color_default); Colorful.Console.WriteLine(" Obtain wifi, cred manager and clipboard information executing CMD commands", Color.Gray);
|
||||
Colorful.Console.Write("\tsysteminfo", color_default); Colorful.Console.WriteLine(" Search system information", Color.Gray);
|
||||
Colorful.Console.Write("\tuserinfo", color_default); Colorful.Console.WriteLine(" Search user information", Color.Gray);
|
||||
|
@ -10,6 +10,7 @@ using System.Reflection;
|
||||
using System.Security.AccessControl;
|
||||
using System.Runtime.InteropServices;
|
||||
using Colorful;
|
||||
using System.Threading;
|
||||
|
||||
namespace winPEAS
|
||||
{
|
||||
@ -334,7 +335,7 @@ namespace winPEAS
|
||||
// with a file and is the combination of all rights in this enumeration.
|
||||
int FullControl = 2032127;
|
||||
|
||||
int[] permissions = { FullControl, TakeOwnership, ChangePermissions, Modify, Delete, Write, WriteAttributes, WriteExtendedAttributes, AppendData, WriteData };
|
||||
int[] permissions = { FullControl, TakeOwnership, ChangePermissions, Modify, Write, WriteData, Delete, WriteAttributes, WriteExtendedAttributes, AppendData };
|
||||
try
|
||||
{
|
||||
FileSecurity fSecurity = File.GetAccessControl(path);
|
||||
@ -349,8 +350,12 @@ namespace winPEAS
|
||||
{
|
||||
if ((perm & current_right) == perm)
|
||||
{
|
||||
results.Add(String.Format("{0} [{1}]", rule.IdentityReference.Value, rule.FileSystemRights));
|
||||
break;
|
||||
string to_add = String.Format("{0} [{1}]", rule.IdentityReference.Value, rule.FileSystemRights);
|
||||
if (!results.Contains(to_add))
|
||||
{
|
||||
results.Add(to_add);
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
@ -395,20 +400,20 @@ namespace winPEAS
|
||||
return results;
|
||||
|
||||
Dictionary<string, int> interesting_perms = new Dictionary<string, int>()
|
||||
{
|
||||
{ "WriteData", (int)FileSystemRights.WriteData },
|
||||
{ "AppendData", (int)FileSystemRights.AppendData },
|
||||
{ "WriteExtendedAttributes", (int)FileSystemRights.WriteExtendedAttributes },
|
||||
{ "WriteAttributes", (int)FileSystemRights.WriteAttributes },
|
||||
{ "Write", (int)FileSystemRights.Write },
|
||||
{ "Delete", (int)FileSystemRights.Delete },
|
||||
{ "Modify", (int)FileSystemRights.Modify },
|
||||
{ "ChangePermissions", (int)FileSystemRights.ChangePermissions },
|
||||
{ "TakeOwnership", (int)FileSystemRights.TakeOwnership },
|
||||
{ "FullControl", (int)FileSystemRights.FullControl },
|
||||
{ "GenericAll", 268435456},
|
||||
{ "GenericWrite", 1073741824 }
|
||||
};
|
||||
{
|
||||
{ "GenericAll", 268435456},
|
||||
{ "FullControl", (int)FileSystemRights.FullControl },
|
||||
{ "TakeOwnership", (int)FileSystemRights.TakeOwnership },
|
||||
{ "GenericWrite", 1073741824 },
|
||||
{ "WriteData", (int)FileSystemRights.WriteData },
|
||||
{ "Modify", (int)FileSystemRights.Modify },
|
||||
{ "Write", (int)FileSystemRights.Write },
|
||||
{ "ChangePermissions", (int)FileSystemRights.ChangePermissions },
|
||||
{ "Delete", (int)FileSystemRights.Delete },
|
||||
{ "AppendData", (int)FileSystemRights.AppendData },
|
||||
{ "WriteAttributes", (int)FileSystemRights.WriteAttributes },
|
||||
{ "WriteExtendedAttributes", (int)FileSystemRights.WriteExtendedAttributes },
|
||||
};
|
||||
|
||||
FileSecurity fSecurity = File.GetAccessControl(path);
|
||||
//Go through the rules returned from the DirectorySecurity
|
||||
@ -426,8 +431,12 @@ namespace winPEAS
|
||||
{
|
||||
if ((entry.Value & current_right) == entry.Value)
|
||||
{
|
||||
results.Add(String.Format("{0} [{1}]", rule.IdentityReference.Value, entry.Key));
|
||||
break;
|
||||
string to_add = String.Format("{0} [{1}]", rule.IdentityReference.Value, entry.Key);
|
||||
if (!results.Contains(to_add))
|
||||
{
|
||||
results.Add(to_add);
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
@ -560,6 +569,9 @@ namespace winPEAS
|
||||
Colorful.Console.WriteLineStyled(String.Join("\n", Directory.GetFiles(path, pattern, SearchOption.TopDirectoryOnly).Where(filepath => !filepath.Contains(".dll"))), ss); // .exe can be contained because of appcmd.exe
|
||||
}
|
||||
|
||||
if (!Program.search_fast)
|
||||
Thread.Sleep(Program.search_time);
|
||||
|
||||
// go recurse in all sub-directories
|
||||
foreach (var directory in Directory.GetDirectories(path))
|
||||
FindFiles(directory, patterns, ss, color);
|
||||
|
@ -9,8 +9,10 @@ namespace winPEAS
|
||||
{
|
||||
class Program
|
||||
{
|
||||
public static bool banner = true;
|
||||
public static string version = "vBETA VERSION";
|
||||
public static bool banner = true;
|
||||
public static bool search_fast = false;
|
||||
public static int search_time = 150;
|
||||
static bool is_fast = false;
|
||||
static bool exec_cmd = false;
|
||||
public static bool using_ansi = false;
|
||||
@ -568,7 +570,7 @@ namespace winPEAS
|
||||
if (autologon.Count > 0) {
|
||||
foreach (KeyValuePair<string, string> entry in autologon)
|
||||
{
|
||||
if (entry.Value != null && entry.Value != "")
|
||||
if (!String.IsNullOrEmpty(entry.Value))
|
||||
{
|
||||
if (!ban)
|
||||
{
|
||||
@ -580,9 +582,9 @@ namespace winPEAS
|
||||
else
|
||||
Colorful.Console.WriteLineStyled(String.Format(" {0,-30}: {1}", entry.Key, entry.Value), CreateUsersSS());
|
||||
}
|
||||
else
|
||||
Beaprint.NotFoundPrint();
|
||||
}
|
||||
if (!ban)
|
||||
Beaprint.NotFoundPrint();
|
||||
}
|
||||
else
|
||||
Beaprint.NotFoundPrint();
|
||||
@ -930,7 +932,7 @@ namespace winPEAS
|
||||
Beaprint.MainPrint("Installed Applications --Via Program Files--", "T1083&T1012&T1010&T1518");
|
||||
Beaprint.LinkPrint("https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#software", "Check if you can modify installed software");
|
||||
Dictionary<string, Dictionary<string, string>> InstalledAppsPerms = ApplicationInfo.GetInstalledAppsPerms();
|
||||
string format = " ==> {0}({1})";
|
||||
string format = " ==> {0} ({1})";
|
||||
foreach (KeyValuePair<string, Dictionary<string, string>> app in InstalledAppsPerms)
|
||||
{
|
||||
if (String.IsNullOrEmpty(app.Value.ToString())) //If empty, nothing found, is good
|
||||
@ -1677,7 +1679,7 @@ namespace winPEAS
|
||||
string using_HKLM_WSUS = MyUtils.GetRegValue("HKLM", path, "UseWUServer");
|
||||
if (HKLM_WSUS.Contains("http://"))
|
||||
{
|
||||
Beaprint.BadPrint(" WSUS is using http!");
|
||||
Beaprint.BadPrint(" WSUS is using http: " + HKLM_WSUS);
|
||||
Beaprint.InfoPrint("You can test https://github.com/pimps/wsuxploit to escalate privileges");
|
||||
if (using_HKLM_WSUS == "1")
|
||||
Beaprint.BadPrint(" And UseWUServer is equals to 1, so it is vulnerable!");
|
||||
@ -2260,6 +2262,9 @@ namespace winPEAS
|
||||
if (string.Equals(arg, "quiet", StringComparison.CurrentCultureIgnoreCase))
|
||||
banner = false;
|
||||
|
||||
if (string.Equals(arg, "searchfast", StringComparison.CurrentCultureIgnoreCase))
|
||||
search_fast = false;
|
||||
|
||||
if (string.Equals(arg, "help", StringComparison.CurrentCultureIgnoreCase))
|
||||
{
|
||||
Beaprint.PrintUsage();
|
||||
|
@ -296,7 +296,7 @@ namespace winPEAS
|
||||
}
|
||||
else if (fullInfo)
|
||||
{
|
||||
string userLine = user["Caption"] + ((string)user["Fullname"] != "false" ? "" : " (" + user["Fullname"] + ")") + ((bool)user["Disabled"] ? "(Disabled)" : "") + ((bool)user["Lockout"] ? "(Lockout)" : "") + (((string)user["Description"]).Length > 1 ? ": " + user["Description"] : "");
|
||||
string userLine = user["Caption"] + ((bool)user["Disabled"] ? "(Disabled)" : "") + ((bool)user["Lockout"] ? "(Lockout)" : "") + ((string)user["Fullname"] != "false" ? "" : "(" + user["Fullname"] + ")") + (((string)user["Description"]).Length > 1 ? ": " + user["Description"] : "");
|
||||
List<string> user_groups = GetUserGroups((string)user["Name"]);
|
||||
string groupsLine = "";
|
||||
if (user_groups.Count > 0)
|
||||
|
@ -100,10 +100,10 @@ namespace winPEAS
|
||||
{
|
||||
foreach (Vulnerability vuln in _vulnerabilities.Where(i => i.Vulnerable))
|
||||
{
|
||||
Beaprint.BadPrint(String.Format(" [!] {0} : VULNERABLE", vuln.Identification));
|
||||
Beaprint.BadPrint(String.Format(" [!] {0} : VULNERABLE", vuln.Identification));
|
||||
|
||||
foreach (string exploit in vuln.KnownExploits)
|
||||
Beaprint.BadPrint(String.Format(" [>] {0}", exploit));
|
||||
Beaprint.BadPrint(String.Format(" [>] {0}", exploit));
|
||||
|
||||
System.Console.WriteLine();
|
||||
}
|
||||
|
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
@ -34,8 +34,8 @@ D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\b
|
||||
D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\bin\Release\winPEAS.exe
|
||||
D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\bin\Release\winPEAS.pdb
|
||||
D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\bin\Release\Microsoft.Win32.TaskScheduler.xml
|
||||
D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\obj\Release\winPEAS.csprojAssemblyReference.cache
|
||||
D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\obj\Release\winPEAS.csproj.Fody.CopyLocal.cache
|
||||
D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\obj\Release\winPEAS.csproj.CopyComplete
|
||||
D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\obj\Release\winPEAS.exe
|
||||
D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\obj\Release\winPEAS.pdb
|
||||
D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\obj\Release\winPEAS.csprojAssemblyReference.cache
|
||||
|
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
@ -14,3 +14,4 @@ D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\o
|
||||
D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\obj\x86\Release\winPEAS.csproj.CopyComplete
|
||||
D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\obj\x86\Release\winPEAS.exe
|
||||
D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\obj\x86\Release\winPEAS.pdb
|
||||
D:\shared\privilege-escalation-awesome-script-suite\winPEAS\winPEASexe\winPEAS\obj\x86\Release\winPEAS.csprojAssemblyReference.cache
|
||||
|
BIN
winPEAS/winPEASexe/winPEAS/obj/x86/Release/winPEAS.csprojAssemblyReference.cache
Executable file
BIN
winPEAS/winPEASexe/winPEAS/obj/x86/Release/winPEAS.csprojAssemblyReference.cache
Executable file
Binary file not shown.
Binary file not shown.
Binary file not shown.
Loading…
Reference in New Issue
Block a user