Tools which will make your life easier in a search for privilege escalation paths

Summary

Name Unix Windows Solaris MacOS
PEASS sh exe and bat - sh
BeRoot py exe - py
Unix privesc check sh - - -
Windows Exploit Suggester - systeminfo - -
Linux Exploit Suggester perl - - -
Solaris Exploit Suggester - - showrev -
LinEnum sh - - -
Nishang - ps - -
SharpUp - exe - -
Seatbelt - exe - -
JAWS - ps - -
Watson - exe - -
PowerUp - ps - -
srvcheck3 - exe - -

PEASS

PEASS - Privilege Escalation Awesome Scripts SUITE

Link: https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/blob/master/README.md

These tools search for possible local privilege escalation paths that you could exploit and print them to you with nice colors so you can recognize the misconfigurations easily.

BeRoot

BeRoot Project is a post exploitation tool to check common misconfigurations to find a way to escalate our privilege. It has been added to the pupy project as a post exploitation module (so it will be executed in memory without touching the disk).

Link: https://github.com/AlessandroZ/BeRoot

Windows pre compiled versions: https://github.com/AlessandroZ/BeRoot/releases

Linux: https://github.com/AlessandroZ/BeRoot/tree/master/Linux

Unix privesc check

Unix-privesc-checker is a script that runs on Unix systems (tested on Solaris 9, HPUX 11, Various Linuxes, FreeBSD 6.2). It tries to find misconfigurations that could allow local unprivileged users to escalate privileges to other users or to access local apps (e.g. databases).