mirror of
https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite.git
synced 2025-12-06 00:51:28 +00:00
WMIC has been deprecated since Windows 10 20H1 and removed in Windows 11. The script was exiting early when WMIC commands failed instead of continuing. Changes: - Add proper WMIC existence checks using 'where wmic' before execution - Implement PowerShell fallbacks for all WMIC commands - Fix hotfix enumeration (Get-HotFix) - Fix antivirus detection (Get-CimInstance) - Fix mounted disk enumeration (Get-PSDrive) - Fix running process checks (Get-Process) - Fix service binary permission checks (Get-CimInstance Win32_Service) - Add error suppression (2>nul) to conditional WMIC exploit checks The script now properly detects WMIC availability and falls back to PowerShell equivalents, ensuring full functionality on modern Windows systems while maintaining backward compatibility with older systems. 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
Windows Privilege Escalation Awesome Scripts
Check the Local Windows Privilege Escalation checklist from book.hacktricks.wiki
Check more information about how to exploit found misconfigurations in book.hacktricks.wiki
Quick Start
Find the latest versions of all the scripts and binaries in the releases page.
WinPEAS Flavours
- Link to WinPEAS C# .exe project (.Net >= 4.5.2 required)
- Please, read the Readme of that folder to learn how to execute winpeas from memory or how make colors work among other tricks
- Link to WinPEAS .ps1 project
- Link to WinPEAS .bat project
PEASS Style
Are you a PEASS fan? Get now our merch at PEASS Shop and show your love for our favorite peas
Advisory
All the scripts/binaries of the PEAS Suite should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own networks and/or with the network owner's permission.
