PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Go to file
Signum21 340256b3b3
Better error handling in FileAnalysis
The previous specific check doesn't handle the following exception, causing it to be catched by the last try/catch block.

Error looking for regexes inside files: System.AggregateException: One or more errors occurred. ---> System.UnauthorizedAccessException: Access to the path '<REDACTED>' is denied.
2023-11-28 00:38:13 +01:00
.github Update CI-master_tests.yml 2023-07-31 16:55:07 +02:00
build_lists - added alphaFS as 3rd party library 2023-07-30 11:01:20 +02:00
linPEAS Update 9_interesting_files.sh 2023-10-02 23:54:28 +02:00
metasploit Update peass.rb 2023-07-25 12:33:15 -05:00
parsers Fix typo in /parser/README.md 2022-10-09 13:56:29 +09:00
winPEAS Better error handling in FileAnalysis 2023-11-28 00:38:13 +01:00
.gitignore add .gitignore 2023-04-13 22:43:10 +02:00
CONTRIBUTING.md separated linpeas 2021-12-18 14:48:01 -05:00
LICENSE use releases page 2021-12-29 13:47:01 -05:00
README.md f 2023-06-01 00:16:51 +02:00
TODO.md Update TODO.md 2021-10-04 17:22:07 +01:00

PEASS-ng - Privilege Escalation Awesome Scripts SUITE new generation

Basic Tutorial

Tutorial

Here you will find privilege escalation tools for Windows and Linux/Unix* and MacOS.

These tools search for possible local privilege escalation paths that you could exploit and print them to you with nice colors so you can recognize the misconfigurations easily.

  • Check the Local Windows Privilege Escalation checklist from book.hacktricks.xyz

  • WinPEAS - Windows local Privilege Escalation Awesome Script (C#.exe and .bat)

  • Check the Local Linux Privilege Escalation checklist from book.hacktricks.xyz

  • LinPEAS - Linux local Privilege Escalation Awesome Script (.sh)

Quick Start

Find the latest versions of all the scripts and binaries in the releases page.

JSON, HTML & PDF output

Check the parsers directory to transform PEASS outputs to JSON, HTML and PDF

Support PEASS-ng and HackTricks and get benefits

Do you want to have access the latest version of Hacktricks and PEASS, obtain a PDF copy of Hacktricks, and more? Discover the brand new SUBSCRIPTION PLANS for individuals and companies.

LinPEAS, WinPEAS and MacPEAS arent enough for you? Welcome The PEASS Family, a limited collection of exclusive NFTs of our favourite PEASS in disguise, designed by my team. Go get your favourite and make it yours! And if you are a PEASS & Hacktricks enthusiast, you can get your hands now on our custom swag and show how much you like our projects!

You can also, join the 💬 Discord group or the telegram group to learn about latest news in cybersecurity and meet other cybersecurity enthusiasts, or follow me on Twitter 🐦 @hacktricks_live.

Let's improve PEASS together

If you want to add something and have any cool idea related to this project, please let me know it in the telegram group https://t.me/peass or contribute reading the CONTRIBUTING.md file.

Advisory

All the scripts/binaries of the PEAS suite should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own machines and/or with the owner's permission.

By Polop(TM)