PEASS - Privilege Escalation Awesome Scripts SUITE (with colors) (by carlospolop)


Basic privilege-escalation-awesome-scripts-suite repo stats
4 days ago

carlospolop/privilege-escalation-awesome-scripts-suite is an open source project licensed under MIT License which is an OSI approved license.

Privilege-escalation-awesome-scripts-suite Alternatives

Similar projects and alternatives to privilege-escalation-awesome-scripts-suite based on common topics and language

  • GitHub repo PayloadsAllTheThings

    A list of useful payloads and bypass for Web Application Security and Pentest/CTF

  • GitHub repo traitor

    Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins :arrow_up: :skull_and_crossbones:

  • GitHub repo GTFONow

    Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries

  • GitHub repo ipban

    IPBan Monitors failed logins and bad behavior and bans ip addresses on Windows and Linux. Highly configurable, lean and powerful. Learn more at ↓

  • GitHub repo cross-platform-terminal-characters

    All the characters that work on most terminals

  • GitHub repo SharpShares

    .NET 4.0 Share Hunting and ACL Mapping

  • GitHub repo PowerShell

    PowerShell for every system!

NOTE: The number of mentions on this list indicates mentions on common posts. Hence, a higher number means a better privilege-escalation-awesome-scripts-suite alternative or higher similarity.


Posts where privilege-escalation-awesome-scripts-suite has been mentioned. We have used some of these posts to build our list of alternatives and similar projects - the last one was on 2021-04-14.
  • Best OSCP resources/cheat sheets/webpages/references Post them here | 2021-04-14
  • A black-box penetration test (coursework) - please help me - go through methods listed there for each port
  • Best Learning Material for OSCP? | 2021-04-06
    Best learning material is very subjective, one man's meat is another man's poison, I felt the more practice with lab machines the more experience gained. I recommend when doing lab machines use,,, as the base materials, then next thing is learn how to use searchsploit, and use correct keywords to find the things you need from google.
  • Where can I get the list of all possible attacks? | 2021-03-29 this one is my favorite, there is a page with common attacks / useful commands for every common port.
  • PAM for SSH - /etc/pam.d/sshd
    I've recently run the linpeas script, which I've been told should highlight any security issues on my Linux box. Though nothing of significance has shown up, I've seen it's flagged a few auth lines in my /etc/pam.d/sshd file.
  • How to do a Checkup on Linux
  • Passed my OSCP; story and hot take below | 2021-03-25
    I used this website for general reading:
  • Traitor: Linux privilege escalation made easy | 2021-02-26
    How does this really differ from linpeas (Linpeas Github) or unixprivchecker (unixprivchecker Github)? The readme is saying the script stops if it ever gets root, but what about other vulnerabilities that may exist simultaneously? While no script can do everything, does it account for the different branches SUID / SGID exploits can take ( vi | GTFOBins)? | 2021-02-22
    Seems interesting with the Docker exploit I guess. I would still recommend linpeas:

    Most of these tricks are listed here at GTFOBins: which is based on LOLBAS for Windows:

  • Privilege escalation problem | 2020-12-22
    Check out and the accompanying “book” at