# Automated Tools

## WinPEAS

{% embed url="<https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS>" %}
WinPEAS
{% endembed %}

winPEAS.bat does not support color. If winPEAS.exe does not show color, edit registry:

```powershell
REG ADD HKCU\Console /v VirtualTerminalLevel /t REG_DWORD /d 1
```

## Windows PrivEsc Checklist

{% embed url="<https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation>" %}
Windows PrivEsc Checklist
{% endembed %}

## PowerUp

{% embed url="<https://github.com/PowerShellMafia/PowerSploit/tree/master/Privesc>" %}
PowerUp
{% endembed %}

## JAWS

{% embed url="<https://github.com/411Hall/JAWS>" %}
JAWS
{% endembed %}

## Windows Exploit Suggester

{% embed url="<https://github.com/AonCyberLabs/Windows-Exploit-Suggester>" %}
Windows Exploit Suggester
{% endembed %}

## Metasploit Local Exploit Suggester

{% embed url="<https://blog.rapid7.com/2015/08/11/metasploit-local-exploit-suggester-do-less-get-more/>" %}
Metasploit Local Exploit Suggester
{% endembed %}

In a Meterpreter shell:

```
meterpreter > run post/multi/recon/local_exploit_suggester
```

## Seatbelt

{% embed url="<https://github.com/GhostPack/Seatbelt>" %}
Seatbelt
{% endembed %}

## SharpUp

{% embed url="<https://github.com/GhostPack/SharpUp>" %}
SharpUp
{% endembed %}
