PEASS-ng/winPEAS
makikvues 9a6e5d5831 - fixed namespaces
- added CredentialGuard check
- added Named Pipes enumeration
- added Printers enumeration
- added SysMon enumeration
- added Logon Sessions enumeration
- added SuperPutty config files check
- added Oracle SQL Developer Config files check
- added AMSI providers check
- added SCCM check
- fixed output formatting
2021-01-31 14:13:56 +01:00
..
winPEASbat updated color scheme 2020-10-09 15:08:57 +02:00
winPEASexe - fixed namespaces 2021-01-31 14:13:56 +01:00
README.md Update README.md 2020-08-11 11:51:12 +01:00

Windows Privilege Escalation Awesome Scripts

Check the Local Windows Privilege Escalation checklist from book.hacktricks.xyz

Check more information about how to exploit found misconfigurations in book.hacktricks.xyz

WinPEAS .exe and .bat

Let's improve PEASS together

If you want to add something and have any cool idea related to this project, please let me know it in the telegram group https://t.me/peass or using github issues and we will update the master version.

Please, if this tool has been useful for you consider to donate

paypal

Looking for a useful Privilege Escalation Course?

Contact me and ask about the Privilege Escalation Course I am preparing for attackers and defenders (100% technical).

Advisory

All the scripts/binaries of the PEAS Suite should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own networks and/or with the network owner's permission.

License

MIT License

By Polop(TM)