From d608956e0b53676fd1f8597942483326f6a82e99 Mon Sep 17 00:00:00 2001 From: Carlos Polop Date: Sun, 12 Apr 2020 17:15:10 +0100 Subject: [PATCH] Update README.md --- README.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/README.md b/README.md index a6e7645..d17e63f 100755 --- a/README.md +++ b/README.md @@ -2,6 +2,8 @@ ![](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/raw/master/linPEAS/images/peass.png) +![](https://img.shields.io/badge/Black-Arch-black) ![](https://img.shields.io/badge/Arch-AUR-brightgreen) ![](https://img.shields.io/badge/BHAsiaArsenal-2020-red) + Here you will find **privilege escalation tools for Windows and Linux/Unix\*** (in some near future also for Mac). These tools search for possible **local privilege escalation paths** that you could exploit and print them to you **with nice colors** so you can recognize the misconfigurations easily.