PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Go to file
Gildasio Junior 8ea67f3cc2
Set grep to show filename that contains passwords
This way one can identify which file contains the relevant information,
eg:

/var/log/responder/Poisoners-Session.log:2025-02-09 21:12:12,701 - [*] Skipping previously captured cleartext password for donald
/var/log/responder/Responder-Session.log:11/02/2025 12:33:11 PM - [HTTP] Basic Password : bambam
/var/log/responder/Responder-Session.log:11/02/2025 12:36:12 PM - [HTTP] Basic Password : estrella
2025-02-28 19:54:44 -03:00
.github Update CI-master_tests.yml 2024-10-01 13:16:13 +02:00
build_lists update azure files with tokens 2025-01-26 15:58:48 +01:00
linPEAS Set grep to show filename that contains passwords 2025-02-28 19:54:44 -03:00
metasploit peass-ng 2024-04-04 11:30:56 +02:00
parsers Brief description of your changes 2025-01-06 13:55:15 +01:00
winPEAS fix 2025-02-24 00:21:09 +01:00
.gitignore fix azure apps 2024-12-21 15:12:59 +01:00
CONTRIBUTING.md Update CONTRIBUTING.md 2024-09-23 14:41:43 +02:00
LICENSE WinPEASS Big Update 2024-08-27 22:08:48 +02:00
README.md Brief description of your changes 2025-01-06 13:55:15 +01:00
TODO.md peass-ng 2024-04-04 11:30:56 +02:00

PEASS-ng - Privilege Escalation Awesome Scripts SUITE new generation

Basic Tutorial

Tutorial

Here you will find privilege escalation tools for Windows and Linux/Unix* and MacOS.

These tools search for possible local privilege escalation paths that you could exploit and print them to you with nice colors so you can recognize the misconfigurations easily.

  • Check the Local Windows Privilege Escalation checklist from book.hacktricks.wiki

  • WinPEAS - Windows local Privilege Escalation Awesome Script (C#.exe and .bat)

  • Check the Local Linux Privilege Escalation checklist from book.hacktricks.wiki

  • LinPEAS - Linux local Privilege Escalation Awesome Script (.sh)

Quick Start

Find the latest versions of all the scripts and binaries in the releases page.

JSON, HTML & PDF output

Check the parsers directory to transform PEASS outputs to JSON, HTML and PDF

Join us!

If you are a PEASS & Hacktricks enthusiast, you can get your hands now on our custom swag and show how much you like our projects!

You can also, join the 💬 Discord group or the telegram group to learn about latest news in cybersecurity and meet other cybersecurity enthusiasts, or follow me on Twitter 🐦 @hacktricks_live.

Let's improve PEASS together

If you want to add something and have any cool idea related to this project, please let me know it in the telegram group https://t.me/peass or contribute reading the CONTRIBUTING.md file.

Advisory

All the scripts/binaries of the PEAS suite should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own machines and/or with the owner's permission.