PEASS-ng/winPEAS/winPEASps1
RandolphConley ac6b5a9add Updated code to strip first column and add "group name" header
Line 70 comment: This should now work for any language. Command runs whoami group, removes the first two line of output, converts from csv to object, but adds "group name" to the first column.
2024-10-01 09:18:48 -04:00
..
README.md Update README.md 2023-07-20 17:44:02 +02:00
winPEAS.ps1 Updated code to strip first column and add "group name" header 2024-10-01 09:18:48 -04:00

Windows Privilege Escalation Awesome Script (.ps1)

WinPEAS is a script that search for possible paths to escalate privileges on Windows hosts. The checks are explained on book.hacktricks.xyz

Check also the Local Windows Privilege Escalation checklist from book.hacktricks.xyz

Mantainer

The official maintainer of this script is RandolphConley.

Quick Start

Download the latest releas from here.

powershell "IEX(New-Object Net.WebClient).downloadString('https://raw.githubusercontent.com/carlospolop/PEASS-ng/master/winPEAS/winPEASps1/winPEAS.ps1')"

## Advisory

All the scripts/binaries of the PEAS Suite should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own networks and/or with the network owner's permission.


By Polop