PrivescCheck
BSD-3-Clause๐ฅ Offensive Ops ยท PowerShell
PrivescCheck is a PowerShell script that enumerates common Windows privilege escalation vectors. It checks for misconfigured services (unquoted paths, weak permissions, writable binaries), vulnerable scheduled tasks, exploitable registry keys, stored credentials (Windows Vault, GPP passwords, autologon), DLL hijacking opportunities, AlwaysInstallElevated policies, and dozens of other escalation paths. Unlike automated exploitation tools, PrivescCheck only enumerates and reports findings, allowing the tester to understand and manually exploit each vector. Output is color-coded by severity with detailed remediation guidance.
Installation
$ git clone https://github.com/itm4n/PrivescCheck.gitUse Cases
- Enumerating Windows privilege escalation vectors
- Finding misconfigured services and weak permissions
- Discovering stored credentials and autologon entries
- Security auditing Windows host configurations
Tags
Details
- Category
- ๐ฅ Offensive Ops
- Language
- PowerShell
- Repository
- itm4n/PrivescCheck
- License
- BSD-3-Clause
- Platforms
- ๐ชwindows
Links
Community Reviews
Alternatives & Comparisons
LinPEAS
ShellLinux privilege escalation enumeration script. Finds misconfigs, SUID bins, creds, and escalation paths.
Compare PrivescCheck vs LinPEASPowerSploit
PowerShellCollection of PowerShell post-exploitation modules. Credential theft, privilege escalation, persistence, exfiltration.
Compare PrivescCheck vs PowerSploitMore in Offensive Ops
Mythic
GoCollaborative, multi-platform C2 framework. Docker-based with web UI, multiple agent types, and plugin architecture.
Havoc
C/C++Modern C2 framework. Qt-based GUI, BOF support, custom agents, and a Cobalt Strike-inspired workflow.
Rubeus
C#C# toolset for raw Kerberos interaction and abuse. AS-REP roasting, Kerberoasting, ticket manipulation, delegation attacks.
Certipy
PythonActive Directory Certificate Services (AD CS) abuse tool. Find and exploit certificate template misconfigurations.
Coercer
PythonAutomatically find and exploit Windows authentication coercion vulnerabilities. PetitPotam, PrinterBug, and more.
SharpHound
C#Official BloodHound data collector. Enumerates Active Directory objects, sessions, ACLs, and trusts for graph analysis.