https://github.com/khulnasoft/pass-ng
https://github.com/khulnasoft/pass-ng
Last synced: about 4 hours ago
JSON representation
- Host: GitHub
- URL: https://github.com/khulnasoft/pass-ng
- Owner: khulnasoft
- License: other
- Created: 2024-04-02T20:10:51.000Z (over 1 year ago)
- Default Branch: master
- Last Pushed: 2024-09-07T12:41:10.000Z (about 1 year ago)
- Last Synced: 2025-03-26T20:17:29.130Z (6 months ago)
- Language: C#
- Size: 16.4 MB
- Stars: 0
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
README
# PASS-ng - Privilege Access Security Suite

  
# Basic Tutorial
Here you will find **privilege escalation tools for Windows and Linux/Unix\* and MacOS**.
These tools search for possible **local privilege escalation paths** that you could exploit and print them to you **with nice colors** so you can recognize the misconfigurations easily.
- Check the **Local Windows Privilege Escalation checklist** from **[book.khulnasoft.com](https://book.khulnasoft.com/windows-hardening/checklist-windows-privilege-escalation)**
- **[WinPEAS](https://github.com/khulnasoft/pass-ng/tree/master/winPEAS) - Windows local Privilege Access Security Suite (C#.exe and .bat)**- Check the **Local Linux Privilege Escalation checklist** from **[book.khulnasoft.com](https://book.khulnasoft.com/linux-hardening/linux-privilege-escalation-checklist)**
- **[LinPEAS](https://github.com/khulnasoft/pass-ng/tree/master/linPEAS) - Linux local Privilege Access Security Suite (.sh)**## Quick Start
Find the **latest versions of all the scripts and binaries in [the releases page](https://github.com/khulnasoft/PASS-ng/releases/latest)**.## JSON, HTML & PDF output
Check the **[parsers](./parsers/)** directory to **transform PASS outputs to JSON, HTML and PDF**## Support PASS-ng and HackTricks and get benefits
Do you want to have **access the latest version of Hacktricks and PASS**, obtain a **PDF copy of Hacktricks**, and more? Discover the **brand new [SUBSCRIPTION PLANS](https://github.com/sponsors/khulnasoft?frequency=one-time) for individuals and companies**.
**LinPEAS, WinPEAS and MacPEAS** aren’t enough for you? Welcome [**The PASS Family**](https://opensea.io/collection/the-pass-family/), a limited collection of [**exclusive NFTs**](https://opensea.io/collection/the-pass-family/) of our favourite PASS in disguise, designed by my team. Go **get your favourite and make it yours!** And if you are a **PASS & Hacktricks enthusiast**, you can get your hands now on **our [custom swag](https://pass.creator-spring.com/) and show how much you like our projects!**
You can also, join the 💬 [Discord group](https://discord.gg/hRep4RUj7f) or the [telegram group](https://t.me/khulnasoft) to learn about latest news in cybersecurity and meet other cybersecurity enthusiasts, or follow me on Twitter 🐦 [@khulnasoft](https://twitter.com/khulnasoft).
## Let's improve PASS together
If you want to **add something** and have **any cool idea** related to this project, please let me know it in the **telegram group https://t.me/khulnasoft** or contribute reading the **[CONTRIBUTING.md](https://github.com/khulnasoft/pass-ng/blob/master/CONTRIBUTING.md)** file.
## Advisory
All the scripts/binaries of the PEAS suite should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own machines and/or with the owner's permission.
By KhulnaSoft(TM)