Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/carlospolop/PEASS-ng
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
https://github.com/carlospolop/PEASS-ng
bash batch batch-script color csharp enumeration exe linpe linpeas linux one-liner oneliner peas privesc script shell unix windows winpeas
Last synced: 4 months ago
JSON representation
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
- Host: GitHub
- URL: https://github.com/carlospolop/PEASS-ng
- Owner: peass-ng
- License: other
- Created: 2019-01-13T19:58:24.000Z (almost 6 years ago)
- Default Branch: master
- Last Pushed: 2024-07-28T04:26:33.000Z (5 months ago)
- Last Synced: 2024-08-04T02:07:02.050Z (4 months ago)
- Topics: bash, batch, batch-script, color, csharp, enumeration, exe, linpe, linpeas, linux, one-liner, oneliner, peas, privesc, script, shell, unix, windows, winpeas
- Language: C#
- Homepage: https://book.hacktricks.xyz
- Size: 59 MB
- Stars: 15,487
- Watchers: 226
- Forks: 3,016
- Open Issues: 28
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - carlospolop/PEASS-ng - PEASS - Privilege Escalation Awesome Scripts SUITE (with colors) (C# #)
- StarryDivineSky - carlospolop/PEASS-ng
README
# PEASS-ng - Privilege Escalation Awesome Scripts SUITE new generation
![](https://github.com/peass-ng/PEASS-ng/raw/master/linPEAS/images/peass.png)
![](https://img.shields.io/badge/Black-Arch-black) ![](https://img.shields.io/badge/Arch-AUR-brightgreen) ![](https://img.shields.io/badge/Black%20Hat%20Arsenal-Asia%202020-red)
# Basic Tutorial
[![Tutorial](https://img.youtube.com/vi/2Ey1WQXNp3w/0.jpg)](https://www.youtube.com/watch?v=9_fJv_weLU0&list=PL9fPq3eQfaaDxjpXaDYApfVA_IB8T14w7)Here you will find **privilege escalation tools for Windows and Linux/Unix\* and MacOS**.
These tools search for possible **local privilege escalation paths** that you could exploit and print them to you **with nice colors** so you can recognize the misconfigurations easily.
- Check the **Local Windows Privilege Escalation checklist** from **[book.hacktricks.xyz](https://book.hacktricks.xyz/windows-hardening/checklist-windows-privilege-escalation)**
- **[WinPEAS](https://github.com/peass-ng/PEASS-ng/tree/master/winPEAS) - Windows local Privilege Escalation Awesome Script (C#.exe and .bat)**- Check the **Local Linux Privilege Escalation checklist** from **[book.hacktricks.xyz](https://book.hacktricks.xyz/linux-hardening/linux-privilege-escalation-checklist)**
- **[LinPEAS](https://github.com/peass-ng/PEASS-ng/tree/master/linPEAS) - Linux local Privilege Escalation Awesome Script (.sh)**## Quick Start
Find the **latest versions of all the scripts and binaries in [the releases page](https://github.com/peass-ng/PEASS-ng/releases/latest)**.## JSON, HTML & PDF output
Check the **[parsers](./parsers/)** directory to **transform PEASS outputs to JSON, HTML and PDF**## Join us!
If you are a **PEASS & Hacktricks enthusiast**, you can get your hands now on **our [custom swag](https://peass.creator-spring.com/) and show how much you like our projects!**
You can also, join the 💬 [Discord group](https://discord.gg/hRep4RUj7f) or the [telegram group](https://t.me/peass) to learn about latest news in cybersecurity and meet other cybersecurity enthusiasts, or follow me on Twitter 🐦 [@hacktricks_live](https://twitter.com/hacktricks_live).
## Let's improve PEASS together
If you want to **add something** and have **any cool idea** related to this project, please let me know it in the **telegram group https://t.me/peass** or contribute reading the **[CONTRIBUTING.md](https://github.com/peass-ng/PEASS-ng/blob/master/CONTRIBUTING.md)** file.
## Advisory
All the scripts/binaries of the PEAS suite should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own machines and/or with the owner's permission.
By Polop(TM)