PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Go to file
Zoe Kahala eabec47c08
sensitive_files.yaml(SNMP) add createUser to bad_regex
Add `createUser` to `bad_regex` as it likely contains a hardcoded
password.

As an example:
```
createUser bootstrap MD5 SuperSecurePassword123__ DES
```
where `SuperSecurePassword123__` is the password and `bootstrap` is the
username, though I should mention the username maybe misleading here.

Spec/Man-page link:
[freebsd.org - snmpd.conf]

[freebsd.org - snmpd.conf]: https://man.freebsd.org/cgi/man.cgi?query=snmpd.conf#:~:text=your%2D%0A%20%20%20%20%20%20%20self%20instead%3A-,createUser,-%5B%2De%09%20%20%20%20%20%20%20ENGINEID%5D%09%20%20%20%20%20%20username
2023-03-11 11:08:20 -06:00
.github Update CI-master_tests.yml 2022-12-21 15:32:55 +01:00
build_lists sensitive_files.yaml(SNMP) add createUser to bad_regex 2023-03-11 11:08:20 -06:00
linPEAS Check "doas.conf" based on binary existence, not config 2022-12-31 18:43:14 +11:00
metasploit Update peass.rb 2022-01-24 10:33:57 +00:00
parsers Fix typo in /parser/README.md 2022-10-09 13:56:29 +09:00
winPEAS Code Cleanup 2022-12-23 00:45:23 -05:00
.gitignore change url 2022-05-01 17:43:55 +01:00
CONTRIBUTING.md separated linpeas 2021-12-18 14:48:01 -05:00
LICENSE use releases page 2021-12-29 13:47:01 -05:00
README.md change url 2022-05-01 17:43:55 +01:00
TODO.md Update TODO.md 2021-10-04 17:22:07 +01:00

PEASS-ng - Privilege Escalation Awesome Scripts SUITE new generation

Basic Tutorial

Tutorial

Here you will find privilege escalation tools for Windows and Linux/Unix* and MacOS.

These tools search for possible local privilege escalation paths that you could exploit and print them to you with nice colors so you can recognize the misconfigurations easily.

  • Check the Local Windows Privilege Escalation checklist from book.hacktricks.xyz

  • WinPEAS - Windows local Privilege Escalation Awesome Script (C#.exe and .bat)

  • Check the Local Linux Privilege Escalation checklist from book.hacktricks.xyz

  • LinPEAS - Linux local Privilege Escalation Awesome Script (.sh)

Quick Start

Find the latest versions of all the scripts and binaries in the releases page.

JSON, HTML & PDF output

Check the parsers directory to transform PEASS outputs to JSON, HTML and PDF

Support PEASS-ng and HackTricks and get benefits

Do you want to have access the latest version of Hacktricks and PEASS, obtain a PDF copy of Hacktricks, and more? Discover the brand new SUBSCRIPTION PLANS for individuals and companies.

LinPEAS, WinPEAS and MacPEAS arent enough for you? Welcome The PEASS Family, a limited collection of exclusive NFTs of our favourite PEASS in disguise, designed by my team. Go get your favourite and make it yours! And if you are a PEASS & Hacktricks enthusiast, you can get your hands now on our custom swag and show how much you like our projects!

You can also, join the 💬 Discord group or the telegram group to learn about latest news in cybersecurity and meet other cybersecurity enthusiasts, or follow me on Twitter 🐦 @carlospolopm.

Let's improve PEASS together

If you want to add something and have any cool idea related to this project, please let me know it in the telegram group https://t.me/peass or contribute reading the CONTRIBUTING.md file.

Advisory

All the scripts/binaries of the PEAS suite should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own machines and/or with the owner's permission.

By Polop(TM)