https://github.com/peass-ng/PEASS-ng
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
https://github.com/peass-ng/PEASS-ng
bash batch batch-script color csharp enumeration exe linpe linpeas linux one-liner oneliner peas privesc script shell unix windows winpeas
Last synced: 9 months ago
JSON representation
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
- Host: GitHub
- URL: https://github.com/peass-ng/PEASS-ng
- Owner: peass-ng
- License: other
- Created: 2019-01-13T19:58:24.000Z (almost 7 years ago)
- Default Branch: master
- Last Pushed: 2024-07-28T04:26:33.000Z (over 1 year ago)
- Last Synced: 2024-08-04T02:07:02.050Z (over 1 year ago)
- Topics: bash, batch, batch-script, color, csharp, enumeration, exe, linpe, linpeas, linux, one-liner, oneliner, peas, privesc, script, shell, unix, windows, winpeas
- Language: C#
- Homepage: https://book.hacktricks.xyz
- Size: 59 MB
- Stars: 15,487
- Watchers: 226
- Forks: 3,016
- Open Issues: 28
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
- awesome-rainmana - peass-ng/PEASS-ng - PEASS - Privilege Escalation Awesome Scripts SUITE (with colors) (C# #)
- awesome-github-repos - peass-ng/PEASS-ng - PEASS - Privilege Escalation Awesome Scripts SUITE (with colors) (C# #)
- jimsghstars - peass-ng/PEASS-ng - PEASS - Privilege Escalation Awesome Scripts SUITE (with colors) (C# #)
- awesome-hacking-lists - peass-ng/PEASS-ng - PEASS - Privilege Escalation Awesome Scripts SUITE (with colors) (C# #)
- venom - `PEASS-ng` - Here you will find privilege escalation tools for Windows and Linux/Unix* and MacOS. These tools search for possible local privilege escalation paths that you could exploit and print them to you with nice colors so you can recognize the misconfigurations easily. (Operating Systems / Web application and resource analysis tools)
- awesome-starz - peass-ng/PEASS-ng - PEASS - Privilege Escalation Awesome Scripts SUITE (with colors) (C# #)
- awesome-list - PEASS-ng - PEASS - Privilege Escalation Awesome Scripts SUITE (with colors). (Hacking 💀 / Apps (Terminal))
README
# PEASS-ng - Privilege Escalation Awesome Scripts SUITE new generation

  
# Basic Tutorial
[](https://www.youtube.com/watch?v=9_fJv_weLU0&list=PL9fPq3eQfaaDxjpXaDYApfVA_IB8T14w7)
Here you will find **privilege escalation tools for Windows and Linux/Unix\* and MacOS**.
These tools search for possible **local privilege escalation paths** that you could exploit and print them to you **with nice colors** so you can recognize the misconfigurations easily.
- Check the **Local Windows Privilege Escalation checklist** from **[book.hacktricks.wiki](https://book.hacktricks.wiki/en/windows-hardening/checklist-windows-privilege-escalation.html)**
- **[WinPEAS](https://github.com/peass-ng/PEASS-ng/tree/master/winPEAS) - Windows local Privilege Escalation Awesome Script (C#.exe and .bat)**
- Check the **Local Linux Privilege Escalation checklist** from **[book.hacktricks.wiki](https://book.hacktricks.wiki/en/linux-hardening/linux-privilege-escalation-checklist.html)**
- **[LinPEAS](https://github.com/peass-ng/PEASS-ng/tree/master/linPEAS) - Linux local Privilege Escalation Awesome Script (.sh)**
## Quick Start
Find the **latest versions of all the scripts and binaries in [the releases page](https://github.com/peass-ng/PEASS-ng/releases/latest)**.
## JSON, HTML & PDF output
Check the **[parsers](./parsers/)** directory to **transform PEASS outputs to JSON, HTML and PDF**
## Join us!
If you are a **PEASS & Hacktricks enthusiast**, you can get your hands now on **our [custom swag](https://peass.creator-spring.com/) and show how much you like our projects!**
You can also, join the 💬 [Discord group](https://discord.gg/hRep4RUj7f) or the [telegram group](https://t.me/peass) to learn about latest news in cybersecurity and meet other cybersecurity enthusiasts, or follow me on Twitter 🐦 [@hacktricks_live](https://twitter.com/hacktricks_live).
## Let's improve PEASS together
If you want to **add something** and have **any cool idea** related to this project, please let me know it in the **telegram group https://t.me/peass** or contribute reading the **[CONTRIBUTING.md](https://github.com/peass-ng/PEASS-ng/blob/master/CONTRIBUTING.md)** file.
## Advisory
All the scripts/binaries of the PEAS suite should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own machines and/or with the owner's permission.