PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Go to file
Kelve T. Henrique d71900854c Reduce size of cache variables
The variables could explode for huge directory trees. Now when searching
through a relevant directory, just the relevant names will fill the
variables. This should further improve speed.
There is still places to improve with this approach. Some "find /" were
left untouched because they seem to be non-trivial searches filtering
permission bits, for example.
There is a huge bottleneck in the ssh section, namely the search for the
privatekeyfiles! That's why I shifted this process nearer to its use.
2020-04-17 23:05:20 +02:00
linPEAS Reduce size of cache variables 2020-04-17 23:05:20 +02:00
winPEAS Winpeas 2020-04-10 18:54:38 +01:00
.gitignore ig 2019-11-04 11:28:20 -05:00
LICENSE Winpeas 2020-04-10 18:54:38 +01:00
README.md Update README.md 2020-04-12 17:30:17 +01:00

PEASS - Privilege Escalation Awesome Scripts SUITE

Packaging status

Here you will find privilege escalation tools for Windows and Linux/Unix* (in some near future also for Mac).

These tools search for possible local privilege escalation paths that you could exploit and print them to you with nice colors so you can recognize the misconfigurations easily.

  • Check the Local Windows Privilege Escalation checklist from book.hacktricks.xyz

  • WinPEAS - Windows local Privilege Escalation Awesome Script (C#.exe and .bat)

  • Check the Local Linux Privilege Escalation checklist from book.hacktricks.xyz

  • LinPEAS - Linux local Privilege Escalation Awesome Script (.sh)

Let's improve PEASS together

If you want to add something and have any cool idea related to this project, please let me know it in the telegram group https://t.me/peass or using github issues and we will update the master version.

Please, if this tool has been useful for you consider to donate

paypal

Looking for a useful Privilege Escalation Course?

Contact me and ask about the Privilege Escalation Course I am preparing for attackers and defenders (100% technical).

Advisory

All the scripts/binaries of the PEAS suite should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own networks and/or with the network owner's permission.

License

MIT License

By Polop(TM)