diff --git a/.github/ISSUE_TEMPLATE.md b/.github/ISSUE_TEMPLATE.md index 823ca5d..5d21703 100644 --- a/.github/ISSUE_TEMPLATE.md +++ b/.github/ISSUE_TEMPLATE.md @@ -1,4 +1,5 @@ If you are going to suggest something, please remove the following template. +If your issue is related with WinPEAS.ps1 please mention https://github.com/RandolphConley #### Issue description diff --git a/winPEAS/README.md b/winPEAS/README.md index f46fbb8..350f687 100755 --- a/winPEAS/README.md +++ b/winPEAS/README.md @@ -9,10 +9,12 @@ Check more **information about how to exploit** found misconfigurations in **[bo ## Quick Start Find the **latest versions of all the scripts and binaries in [the releases page](https://github.com/carlospolop/PEASS-ng/releases/latest)**. -## WinPEAS .exe and .bat -- [Link to WinPEAS .bat project](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS/winPEASbat) -- [Link to WinPEAS C# project (.exe)](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS/winPEASexe) (.Net >= 4.5.2 required) +## WinPEAS Flavours +- [Link to WinPEAS C# .exe project](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS/winPEASexe) (.Net >= 4.5.2 required) - **Please, read the Readme of that folder to learn how to execute winpeas from memory or how make colors work among other tricks** +- [Link to WinPEAS .ps1 project](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS/winPEASps1) +- [Link to WinPEAS .bat project](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS/winPEASbat) + ## PEASS Style diff --git a/winPEAS/winPEASps1/README.md b/winPEAS/winPEASps1/README.md new file mode 100755 index 0000000..6260b7a --- /dev/null +++ b/winPEAS/winPEASps1/README.md @@ -0,0 +1,26 @@ +# Windows Privilege Escalation Awesome Script (.ps2) + +![](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/raw/master/winPEAS/winPEASexe/images/winpeas.png) + +**WinPEAS is a script that search for possible paths to escalate privileges on Windows hosts. The checks are explained on [book.hacktricks.xyz](https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation)** + +Check also the **Local Windows Privilege Escalation checklist** from **[book.hacktricks.xyz](https://book.hacktricks.xyz/windows-hardening/checklist-windows-privilege-escalation)** + +## Mantainer + +The official **maintainer of this script is [RandolphConley](https://github.com/RandolphConley)**. + +## Quick Start + +Download the **[latest releas from here](https://github.com/carlospolop/PEASS-ng/releases/latest)**. + +```bash +powershell "IEX(New-Object Net.WebClient).downloadString('https://raw.githubusercontent.com/carlospolop/PEASS-ng/master/winPEAS/winPEASps1/WinPeas.ps1')" +``` + +## Advisory + +All the scripts/binaries of the PEAS Suite should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own networks and/or with the network owner's permission. + + +By Polop diff --git a/winPEAS/winPEASps1/WinPeas.ps1 b/winPEAS/winPEASps1/WinPeas.ps1 index a63d256..02589fa 100644 --- a/winPEAS/winPEASps1/WinPeas.ps1 +++ b/winPEAS/winPEASps1/WinPeas.ps1 @@ -6,10 +6,11 @@ .EXAMPLE .\WinPeas.ps1 .NOTES - Version: 1.0 - Author: @Carlospopm and @RandolphConley - Creation Date: 10/4/2022 - Website https://github.com/carlospolop/PEASS-ng + Version: 1.0 + PEASS-ng Original Author: carlospolop + WinPEAS.ps1 Author: @RandolphConley + Creation Date: 10/4/2022 + Website: https://github.com/carlospolop/PEASS-ng TESTED: PoSh 5,7 UNTESTED: Posh 3,4 @@ -140,7 +141,7 @@ Function Get-ClipBoardText { (((((((((/, ,####################(/..((((((((((. (((((((((/,. ,*//////*,. ./(((((((((((. (((((((((((((((((((((((((((/ - by carlospolop + by @RandolphConley & carlospolop " ######################## INTRODUCTION ######################## $stopwatch = [system.diagnostics.stopwatch]::StartNew()