windows-privesc-check
Windows privilege escalation checking tool that identifies misconfigurations allowing local unprivileged users to escalate privileges or access local apps like databases. Standalone executable tested on XP and Windows 7, runs as normal user or Administrator for better results.
Description
Windows-privesc-check is a standalone executable designed to run on Windows systems, specifically tested on XP and Windows 7. It scans for misconfigurations that could enable local unprivileged users to escalate privileges to other users or gain access to local applications such as databases.
The tool is written in Python and converted to an executable using PyInstaller, making it easy to upload and run without needing to install Python or other dependencies. It functions effectively whether run as a normal user or Administrator, though Administrator privileges allow it to read more files and perform a more comprehensive check.
Use cases include post-exploitation assessments on Windows targets to identify privilege escalation vectors from local misconfigurations.
How It Works
The tool executes on Windows systems as a standalone binary compiled from Python via PyInstaller. It enumerates and checks system files, permissions, and configurations for privilege escalation paths, performing deeper analysis with Administrator access to read additional files.
Installation
sudo apt install windows-privesc-checkFlags
Examples
windows-privesc-check -hwindows-privesc-checkrunas /user:Administrator windows-privesc-check/usr/share/windows-resources/windows-privesc-check/windows-privesc-check2.exesudo windows-privesc-check -hwindows-privesc-check2.exe