Article Excerpt
Here you will find privilege escalation tools for Windows and Linux/Unix* and MacOS. These tools search for possible local privilege escalation paths that you could exploit and print them to you with nice colors so you can recognize the misconfigurations easily.
property | value |
tags | github-repo,offensive-tradecraft,pkm-pocket-pipeline,tradecraft-tool |
url | |
original_word_count | 222 |
Long Summary
PEASS-ng (Privilege Escalation Awesome Scripts SUITE new generation) is a collection of tools for Windows, Linux/Unix, and MacOS that search for possible local privilege escalation paths and print them in a user-friendly format. It includes WinPEAS (Windows local Privilege Escalation Awesome Script) and LinPEAS (Linux local Privilege Escalation Awesome Script). The latest versions of all the scripts and binaries can be found in the releases page. Additionally, the parsers directory contains tools to transform PEASS outputs to JSON, HTML, and PDF.
The project also offers subscription plans for individuals and companies, as well as a limited collection of exclusive NFTs of PEASS in disguise. Furthermore, custom swag is available for PEASS & Hacktricks enthusiasts. Finally, the project encourages users to join the telegram group and contribute to the project by reading the CONTRIBUTING.md file.
It is important to note that all the scripts/binaries of the PEAS suite should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator.
PEASS-ng is a collection of tools for Windows, Linux/Unix, and MacOS that search for possible local privilege escalation paths and print them in a user-friendly format. It includes WinPEAS (Windows local Privilege Escalation Awesome Script) and LinPEAS (Linux local Privilege Escalation Awesome Script). The project also offers subscription plans for individuals and companies, as well as a limited collection of exclusive NFTs of PEASS in disguise and custom swag for PEASS & Hacktricks enthusiasts. It encourages users to join the telegram group and contribute to the project by reading the CONTRIBUTING.md file. All the scripts/binaries of the PEAS suite should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator.
Short Summary
š PEASS-ng - Privilege Escalation Awesome Scripts SUITE new generation
šš½ Here you will find privilege escalation tools for Windows and Linux/Unix* and MacOS. These tools search for possible local privilege escalation paths that you could exploit and print them to you with nice colors so you can recognize the misconfigurations easily. šš½ PEASS-ng is a collection of tools for finding local privilege escalation paths. šš½ It works on Windows, Linux/Unix, and MacOS. šš½ WinPEAS and LinPEAS are included in this suite. šš½ The tools print results in a user-friendly format. šš½ The scripts and binaries can be found on the releases page. šš½ The parsers directory has tools to transform outputs to JSON, HTML, and PDF. šš½ Subscription plans for individuals and companies are available. šš½ Limited edition NFTs of PEASS in disguise are also offered. šš½ Custom swag is available for PEASS and Hacktricks enthusiasts. šš½ Contributing to the project is encouraged via Telegram and reading CONTRIBUTING.md.
š source link: https://github.com/carlospolop/PEASS-ng
š summarized content: https://hut.threathunterz.com/battlefield-intel/tradecraft-tools/peass-ng-privilege-escalation-awesome-scripts-suite-new-generation
#PEASS-ng #PrivilegeEscalation #WinPEAS #LinPEAS #PenetrationTesting