Carlos Polop
8801cebe00
Query HKCU for possible registry creds
2026-01-20 18:00:23 +01:00
Carlos Polop
21a967acb5
fix urls
2026-01-20 13:59:32 +01:00
SirBroccoli
9c49dfd2bb
Merge pull request #529 from peass-ng/update_PEASS-winpeas-Pwning_ASUS_DriverHub__MSI_Center__A_20251207_130236
...
[WINPEAS] Add privilege escalation check: Pwning ASUS DriverHub, MSI Center, Acer ...
2026-01-17 16:06:06 +01:00
Carlos Polop
e7663381f2
Merge master into PR 529 and resolve ServicesInfo conflict
2026-01-17 15:52:44 +01:00
SirBroccoli
c447ca993d
Merge branch 'master' into update_PEASS-winpeas-The_Windows_Registry_Adventure__Part_20251217_014635
2026-01-17 15:45:17 +01:00
SirBroccoli
e81c436d80
Merge branch 'master' into update_PEASS-winpeas-Kerberoasting__Low-Tech__High-Impact_20251229_013424
2026-01-17 15:42:10 +01:00
SirBroccoli
e80425aa3d
Merge branch 'master' into update_PEASS-winpeas-SOAPwn__Pwning__NET_Framework_Applic_20251211_184735
2026-01-17 15:35:19 +01:00
Carlos Polop
2f44379713
Fix registry hive resolution in ACL scanner
2026-01-17 15:33:09 +01:00
SirBroccoli
43a7684621
Merge branch 'master' into update_PEASS-winpeas-Windows_Exploitation_Technique__Ampl_20251217_012647
2026-01-17 15:30:32 +01:00
SirBroccoli
7b4a83d51d
Merge branch 'master' into update_PEASS-winpeas-Inside_Ink_Dragon__Revealing_the_Rel_20251216_185841
2026-01-17 15:29:29 +01:00
SirBroccoli
8aa05e13a4
Merge branch 'master' into update_PEASS-winpeas-SOAPwn__Pwning__NET_Framework_Applic_20251211_184735
2026-01-17 15:27:28 +01:00
Carlos Polop
4559fd09ea
Fix SOAP service enumeration yield in try/catch
2026-01-17 15:25:23 +01:00
SirBroccoli
4f8a3b3f25
Merge pull request #531 from peass-ng/update_PEASS-winpeas-pipetap___A_Windows_Named_Pipe_Multi_20251209_013140
...
[WINPEAS] Add privilege escalation check: pipetap – A Windows Named Pipe Multi-too...
2026-01-17 15:24:20 +01:00
Carlos Polop
0ed7a39a7d
Fix unassigned out vars in OEM pipe check
2026-01-17 15:21:50 +01:00
SirBroccoli
974cfe028f
Merge pull request #533 from peass-ng/update_PEASS-winpeas-Cracking_ValleyRAT__From_Builder_Sec_20251210_185002
...
[WINPEAS] Add privilege escalation check: Cracking ValleyRAT From Builder Secrets ...
2026-01-17 15:20:38 +01:00
Carlos Polop
a83d33d409
Merge branch 'master' into update_PEASS-winpeas-LDAP_BOF_Collection___In_Memory_LDAP_20251207_013625
2026-01-17 13:36:53 +01:00
Carlos Polop
1cdd473d79
Merge branch 'master' into update_PEASS-winpeas-Pwning_ASUS_DriverHub__MSI_Center__A_20251207_130236
2026-01-17 13:36:49 +01:00
Carlos Polop
0e29450869
Merge branch 'master' into update_PEASS-winpeas-pipetap___A_Windows_Named_Pipe_Multi_20251209_013140
2026-01-17 13:36:45 +01:00
Carlos Polop
efe9c1625f
Merge branch 'master' into update_PEASS-winpeas-Cracking_ValleyRAT__From_Builder_Sec_20251210_185002
2026-01-17 13:36:41 +01:00
Carlos Polop
4255330728
Merge branch 'master' into update_PEASS-winpeas-SOAPwn__Pwning__NET_Framework_Applic_20251211_184735
2026-01-17 13:36:38 +01:00
Carlos Polop
0e8959a6db
Merge branch 'master' into update_PEASS-winpeas-Inside_Ink_Dragon__Revealing_the_Rel_20251216_185841
2026-01-17 13:36:30 +01:00
Carlos Polop
ea787df91c
Merge branch 'master' into update_PEASS-winpeas-Windows_Exploitation_Technique__Ampl_20251217_012647
2026-01-17 13:36:26 +01:00
Carlos Polop
c14f9aeb30
Merge branch 'master' into update_PEASS-winpeas-The_Windows_Registry_Adventure__Part_20251217_014635
2026-01-17 13:36:22 +01:00
Carlos Polop
14aa117a0e
Merge branch 'master' into update_PEASS-winpeas-Kerberoasting__Low-Tech__High-Impact_20251229_013424
2026-01-17 13:36:06 +01:00
SirBroccoli
93bb3e1a64
Merge pull request #523 from peass-ng/update_PEASS-winpeas-Metasploit_Wrap-Up_11_14_2025_20251127_132610
...
[WINPEAS] Add privilege escalation check: Metasploit Wrap-Up 11/14/2025
2026-01-16 17:33:05 +01:00
HackTricks News Bot
be72fecfa8
Add winpeas privilege escalation checks from: Kerberoasting: Low-Tech, High-Impact Attacks from Legacy Kerberos Crypto
2025-12-29 01:42:21 +00:00
HackTricks News Bot
3268701ed6
Add winpeas privilege escalation checks from: The Windows Registry Adventure, Part 8: Exploitation of Hive-based Memory Corrup
2025-12-17 02:00:18 +00:00
HackTricks News Bot
488d388830
Add winpeas privilege escalation checks from: Windows Exploitation Technique: Amplifying Race Windows via Slow Object Manager
2025-12-17 01:34:41 +00:00
HackTricks News Bot
85aa98a841
Add winpeas privilege escalation checks from: Inside Ink Dragon: Revealing the Relay Network and Inner Workings of a Stealthy
2025-12-16 19:11:20 +00:00
HackTricks News Bot
6100bfaceb
Add winpeas privilege escalation checks from: SOAPwn: Pwning .NET Framework Applications Through HTTP Client Proxies and WSDL
2025-12-11 19:05:05 +00:00
HackTricks News Bot
9123910f9d
Add winpeas privilege escalation checks from: Cracking ValleyRAT: From Builder Secrets to Kernel Rootkits
2025-12-10 19:18:07 +00:00
HackTricks News Bot
b7b7aebf1c
Add winpeas privilege escalation checks from: pipetap – A Windows Named Pipe Multi-tool and Proxy for Intercepting and Replayi
2025-12-09 02:07:57 +00:00
Matt
595e021864
fix: correct typo of SeDebugPrivilege
2025-12-08 00:27:02 +00:00
HackTricks News Bot
6c75f10fae
Add winpeas privilege escalation checks from: Pwning ASUS DriverHub, MSI Center, Acer Control Centre and Razer Synapse 4
2025-12-07 13:22:49 +00:00
HackTricks News Bot
4dad7599e6
Add winpeas privilege escalation checks from: LDAP BOF Collection – In‑Memory LDAP Toolkit for Active Directory Exploitation
2025-12-07 01:59:18 +00:00
HackTricks News Bot
dd220af544
Add winpeas privilege escalation checks from: Metasploit Wrap-Up 11/14/2025
2025-11-27 13:44:39 +00:00
HackTricks News Bot
11c0d14561
Add winpeas privilege escalation checks from: HackTheBox Mirage: Chaining NFS Leaks, Dynamic DNS Abuse, NATS Credential Theft,
2025-11-22 18:54:22 +00:00
moscow chill
336c53a163
Fix ANSI escape codes displaying as literal text in winPEAS.bat
...
The script was setting E=0x1B[ as a literal string instead of the actual
ESC character (ASCII 27), causing color codes to display as text like
"0x1B[33m[+]0x1B[97m" instead of rendering as colors.
Changed the SetOnce subroutine to properly capture the ESC character using
the 'prompt $E' technique before building the ANSI escape sequence prefix.
🤖 Generated with [Claude Code](https://claude.com/claude-code )
Co-Authored-By: Claude <noreply@anthropic.com >
2025-10-29 20:16:34 +01:00
moscow chill
29d8132d93
Fix winPEAS.bat compatibility with Windows 11 and modern Windows 10
...
WMIC has been deprecated since Windows 10 20H1 and removed in Windows 11.
The script was exiting early when WMIC commands failed instead of continuing.
Changes:
- Add proper WMIC existence checks using 'where wmic' before execution
- Implement PowerShell fallbacks for all WMIC commands
- Fix hotfix enumeration (Get-HotFix)
- Fix antivirus detection (Get-CimInstance)
- Fix mounted disk enumeration (Get-PSDrive)
- Fix running process checks (Get-Process)
- Fix service binary permission checks (Get-CimInstance Win32_Service)
- Add error suppression (2>nul) to conditional WMIC exploit checks
The script now properly detects WMIC availability and falls back to
PowerShell equivalents, ensuring full functionality on modern Windows
systems while maintaining backward compatibility with older systems.
🤖 Generated with [Claude Code](https://claude.com/claude-code )
Co-Authored-By: Claude <noreply@anthropic.com >
2025-10-27 16:10:42 +01:00
CravateRouge
b8b4a0fc14
Fix InterfaceFlags syntax
2025-10-07 11:14:45 +08:00
CravateRouge
7042a182df
Add ADCS ESC DC registry checks
2025-10-06 17:18:44 +02:00
jtothef
7c9f431649
Update README.md
...
Fix typo
2025-09-23 12:49:05 -05:00
SirBroccoli
215c5d074e
Merge pull request #456 from peass-ng/dependabot/nuget/winPEAS/winPEASexe/Tests/System.Text.RegularExpressions-4.3.1
...
Bump System.Text.RegularExpressions from 4.3.0 to 4.3.1 in /winPEAS/winPEASexe/Tests
2025-09-03 13:36:40 +02:00
SirBroccoli
46264bf239
Merge pull request #497 from peass-ng/update_PEASS-winpeas-HTB_Sendai__From_password_spray_to_g_20250828_184040
...
[WINPEAS] Add privilege escalation check: HTB Sendai From password spray to gMSA d...
2025-09-03 13:31:10 +02:00
HackTricks News Bot
54d861ab04
Add winpeas privilege escalation checks from: HTB Sendai: From password spray to gMSA dump, then ADCS ESC4 or SQL+Silver Ticke
2025-08-28 18:51:59 +00:00
HackTricks News Bot
bbb932d6d3
feat(winpeas): add ActiveDirectoryInfo check (gMSA readable passwords, AD CS template rights) and include in project
2025-08-28 18:50:51 +00:00
HackTricks News Bot
626ea2d298
docs(usage): add activedirectoryinfo option to usage output
2025-08-28 18:50:22 +00:00
HackTricks News Bot
c314cfd23d
Add winpeas privilege escalation checks from: HTB: TheFrizz (High-level, redacted for safety)
2025-08-27 19:14:43 +00:00
securitytime
933e12d7f1
Update Beaprint.cs
...
A space character is missing here:
"... educational purposes only.Any misuse of this software ..."
2025-06-28 09:12:40 +02:00
Signum21
d335b9254f
Fixed multiple bugs in Vulnerable Leaked Handlers
2025-06-15 20:59:20 +02:00