Commit Graph

419 Commits

Author SHA1 Message Date
Carlos Polop
8801cebe00 Query HKCU for possible registry creds 2026-01-20 18:00:23 +01:00
Carlos Polop
21a967acb5 fix urls 2026-01-20 13:59:32 +01:00
SirBroccoli
9c49dfd2bb Merge pull request #529 from peass-ng/update_PEASS-winpeas-Pwning_ASUS_DriverHub__MSI_Center__A_20251207_130236
[WINPEAS] Add privilege escalation check: Pwning ASUS DriverHub, MSI Center, Acer ...
2026-01-17 16:06:06 +01:00
Carlos Polop
e7663381f2 Merge master into PR 529 and resolve ServicesInfo conflict 2026-01-17 15:52:44 +01:00
SirBroccoli
c447ca993d Merge branch 'master' into update_PEASS-winpeas-The_Windows_Registry_Adventure__Part_20251217_014635 2026-01-17 15:45:17 +01:00
SirBroccoli
e81c436d80 Merge branch 'master' into update_PEASS-winpeas-Kerberoasting__Low-Tech__High-Impact_20251229_013424 2026-01-17 15:42:10 +01:00
SirBroccoli
e80425aa3d Merge branch 'master' into update_PEASS-winpeas-SOAPwn__Pwning__NET_Framework_Applic_20251211_184735 2026-01-17 15:35:19 +01:00
Carlos Polop
2f44379713 Fix registry hive resolution in ACL scanner 2026-01-17 15:33:09 +01:00
SirBroccoli
43a7684621 Merge branch 'master' into update_PEASS-winpeas-Windows_Exploitation_Technique__Ampl_20251217_012647 2026-01-17 15:30:32 +01:00
SirBroccoli
7b4a83d51d Merge branch 'master' into update_PEASS-winpeas-Inside_Ink_Dragon__Revealing_the_Rel_20251216_185841 2026-01-17 15:29:29 +01:00
SirBroccoli
8aa05e13a4 Merge branch 'master' into update_PEASS-winpeas-SOAPwn__Pwning__NET_Framework_Applic_20251211_184735 2026-01-17 15:27:28 +01:00
Carlos Polop
4559fd09ea Fix SOAP service enumeration yield in try/catch 2026-01-17 15:25:23 +01:00
SirBroccoli
4f8a3b3f25 Merge pull request #531 from peass-ng/update_PEASS-winpeas-pipetap___A_Windows_Named_Pipe_Multi_20251209_013140
[WINPEAS] Add privilege escalation check: pipetap – A Windows Named Pipe Multi-too...
2026-01-17 15:24:20 +01:00
Carlos Polop
0ed7a39a7d Fix unassigned out vars in OEM pipe check 2026-01-17 15:21:50 +01:00
SirBroccoli
974cfe028f Merge pull request #533 from peass-ng/update_PEASS-winpeas-Cracking_ValleyRAT__From_Builder_Sec_20251210_185002
[WINPEAS] Add privilege escalation check: Cracking ValleyRAT From Builder Secrets ...
2026-01-17 15:20:38 +01:00
Carlos Polop
a83d33d409 Merge branch 'master' into update_PEASS-winpeas-LDAP_BOF_Collection___In_Memory_LDAP_20251207_013625 2026-01-17 13:36:53 +01:00
Carlos Polop
1cdd473d79 Merge branch 'master' into update_PEASS-winpeas-Pwning_ASUS_DriverHub__MSI_Center__A_20251207_130236 2026-01-17 13:36:49 +01:00
Carlos Polop
0e29450869 Merge branch 'master' into update_PEASS-winpeas-pipetap___A_Windows_Named_Pipe_Multi_20251209_013140 2026-01-17 13:36:45 +01:00
Carlos Polop
efe9c1625f Merge branch 'master' into update_PEASS-winpeas-Cracking_ValleyRAT__From_Builder_Sec_20251210_185002 2026-01-17 13:36:41 +01:00
Carlos Polop
4255330728 Merge branch 'master' into update_PEASS-winpeas-SOAPwn__Pwning__NET_Framework_Applic_20251211_184735 2026-01-17 13:36:38 +01:00
Carlos Polop
0e8959a6db Merge branch 'master' into update_PEASS-winpeas-Inside_Ink_Dragon__Revealing_the_Rel_20251216_185841 2026-01-17 13:36:30 +01:00
Carlos Polop
ea787df91c Merge branch 'master' into update_PEASS-winpeas-Windows_Exploitation_Technique__Ampl_20251217_012647 2026-01-17 13:36:26 +01:00
Carlos Polop
c14f9aeb30 Merge branch 'master' into update_PEASS-winpeas-The_Windows_Registry_Adventure__Part_20251217_014635 2026-01-17 13:36:22 +01:00
Carlos Polop
14aa117a0e Merge branch 'master' into update_PEASS-winpeas-Kerberoasting__Low-Tech__High-Impact_20251229_013424 2026-01-17 13:36:06 +01:00
SirBroccoli
93bb3e1a64 Merge pull request #523 from peass-ng/update_PEASS-winpeas-Metasploit_Wrap-Up_11_14_2025_20251127_132610
[WINPEAS] Add privilege escalation check: Metasploit Wrap-Up 11/14/2025
2026-01-16 17:33:05 +01:00
HackTricks News Bot
be72fecfa8 Add winpeas privilege escalation checks from: Kerberoasting: Low-Tech, High-Impact Attacks from Legacy Kerberos Crypto 2025-12-29 01:42:21 +00:00
HackTricks News Bot
3268701ed6 Add winpeas privilege escalation checks from: The Windows Registry Adventure, Part 8: Exploitation of Hive-based Memory Corrup 2025-12-17 02:00:18 +00:00
HackTricks News Bot
488d388830 Add winpeas privilege escalation checks from: Windows Exploitation Technique: Amplifying Race Windows via Slow Object Manager 2025-12-17 01:34:41 +00:00
HackTricks News Bot
85aa98a841 Add winpeas privilege escalation checks from: Inside Ink Dragon: Revealing the Relay Network and Inner Workings of a Stealthy 2025-12-16 19:11:20 +00:00
HackTricks News Bot
6100bfaceb Add winpeas privilege escalation checks from: SOAPwn: Pwning .NET Framework Applications Through HTTP Client Proxies and WSDL 2025-12-11 19:05:05 +00:00
HackTricks News Bot
9123910f9d Add winpeas privilege escalation checks from: Cracking ValleyRAT: From Builder Secrets to Kernel Rootkits 2025-12-10 19:18:07 +00:00
HackTricks News Bot
b7b7aebf1c Add winpeas privilege escalation checks from: pipetap – A Windows Named Pipe Multi-tool and Proxy for Intercepting and Replayi 2025-12-09 02:07:57 +00:00
Matt
595e021864 fix: correct typo of SeDebugPrivilege 2025-12-08 00:27:02 +00:00
HackTricks News Bot
6c75f10fae Add winpeas privilege escalation checks from: Pwning ASUS DriverHub, MSI Center, Acer Control Centre and Razer Synapse 4 2025-12-07 13:22:49 +00:00
HackTricks News Bot
4dad7599e6 Add winpeas privilege escalation checks from: LDAP BOF Collection – In‑Memory LDAP Toolkit for Active Directory Exploitation 2025-12-07 01:59:18 +00:00
HackTricks News Bot
dd220af544 Add winpeas privilege escalation checks from: Metasploit Wrap-Up 11/14/2025 2025-11-27 13:44:39 +00:00
HackTricks News Bot
11c0d14561 Add winpeas privilege escalation checks from: HackTheBox Mirage: Chaining NFS Leaks, Dynamic DNS Abuse, NATS Credential Theft, 2025-11-22 18:54:22 +00:00
moscow chill
336c53a163 Fix ANSI escape codes displaying as literal text in winPEAS.bat
The script was setting E=0x1B[ as a literal string instead of the actual
ESC character (ASCII 27), causing color codes to display as text like
"0x1B[33m[+]0x1B[97m" instead of rendering as colors.

Changed the SetOnce subroutine to properly capture the ESC character using
the 'prompt $E' technique before building the ANSI escape sequence prefix.

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-29 20:16:34 +01:00
moscow chill
29d8132d93 Fix winPEAS.bat compatibility with Windows 11 and modern Windows 10
WMIC has been deprecated since Windows 10 20H1 and removed in Windows 11.
The script was exiting early when WMIC commands failed instead of continuing.

Changes:
- Add proper WMIC existence checks using 'where wmic' before execution
- Implement PowerShell fallbacks for all WMIC commands
- Fix hotfix enumeration (Get-HotFix)
- Fix antivirus detection (Get-CimInstance)
- Fix mounted disk enumeration (Get-PSDrive)
- Fix running process checks (Get-Process)
- Fix service binary permission checks (Get-CimInstance Win32_Service)
- Add error suppression (2>nul) to conditional WMIC exploit checks

The script now properly detects WMIC availability and falls back to
PowerShell equivalents, ensuring full functionality on modern Windows
systems while maintaining backward compatibility with older systems.

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-27 16:10:42 +01:00
CravateRouge
b8b4a0fc14 Fix InterfaceFlags syntax 2025-10-07 11:14:45 +08:00
CravateRouge
7042a182df Add ADCS ESC DC registry checks 2025-10-06 17:18:44 +02:00
jtothef
7c9f431649 Update README.md
Fix typo
2025-09-23 12:49:05 -05:00
SirBroccoli
215c5d074e Merge pull request #456 from peass-ng/dependabot/nuget/winPEAS/winPEASexe/Tests/System.Text.RegularExpressions-4.3.1
Bump System.Text.RegularExpressions from 4.3.0 to 4.3.1 in /winPEAS/winPEASexe/Tests
2025-09-03 13:36:40 +02:00
SirBroccoli
46264bf239 Merge pull request #497 from peass-ng/update_PEASS-winpeas-HTB_Sendai__From_password_spray_to_g_20250828_184040
[WINPEAS] Add privilege escalation check: HTB Sendai From password spray to gMSA d...
2025-09-03 13:31:10 +02:00
HackTricks News Bot
54d861ab04 Add winpeas privilege escalation checks from: HTB Sendai: From password spray to gMSA dump, then ADCS ESC4 or SQL+Silver Ticke 2025-08-28 18:51:59 +00:00
HackTricks News Bot
bbb932d6d3 feat(winpeas): add ActiveDirectoryInfo check (gMSA readable passwords, AD CS template rights) and include in project 2025-08-28 18:50:51 +00:00
HackTricks News Bot
626ea2d298 docs(usage): add activedirectoryinfo option to usage output 2025-08-28 18:50:22 +00:00
HackTricks News Bot
c314cfd23d Add winpeas privilege escalation checks from: HTB: TheFrizz (High-level, redacted for safety) 2025-08-27 19:14:43 +00:00
securitytime
933e12d7f1 Update Beaprint.cs
A space character is missing here:
"... educational purposes only.Any misuse of this software  ..."
2025-06-28 09:12:40 +02:00
Signum21
d335b9254f Fixed multiple bugs in Vulnerable Leaked Handlers 2025-06-15 20:59:20 +02:00