Skip to content

Imani7unshakeable/alpha-wpes

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

32 Commits
 
 
 
 
 
 

Repository files navigation

alpha-wpes 3.0

Alpha Windows Privilege Escalation Suite 3.0

Released 4th March, 2024

DALLE2024-03-0420 26 40-Createanimagedepictingasophisticatedhackingtoolinterfacenamed22AWPES22 Theinterfaceshouldlooklikeadark-themedcommandlineterminalwit-ezgif com-webp-to-jpg-converter

Features

Alpha Windows Privilege Escalation Suite is designed to gather a wide array of system, network, and security information, as well as perform certain actions that compromise system security.

  1. System and OS Information Gathering: It collects detailed system information, OS versions, and lists Windows updates, helping to identify potentially vulnerable components.

  2. Security Updates and Hotfix IDs: Retrieves and lists security updates and hotfix IDs to assess the patch level of the system.

  3. Environment and Configuration: Extracts environment variables, PowerShell history, and checks for specific registry settings that could indicate system configuration and potential security weaknesses.

  4. Network and Sharing Information: Lists network drives, queries Windows Server Update Services (WSUS) settings, and displays network shares, which could reveal sensitive information or misconfigurations.

  5. User and Group Information: Lists all users, groups, and specific group memberships like Administrators, Remote Desktop Group, providing insight into potential targets for privilege escalation.

  6. Security Policies and Auditing: Checks policies related to AlwaysInstallElevated, audit settings, and Windows Event Forwarding, which might offer avenues for privilege escalation.

  7. Credential Management: Enumerates stored credentials, Logon credentials, and LSA protection, which could be exploited to gain higher privileges.

  8. Networking and Communication: Retrieves IP configuration, lists open ports, and views routing tables, which is useful for both lateral movement and understanding the network layout.

  9. Software and Services: Lists running services, processes, installed software, and startup programs, identifying potential vulnerable applications or services that run with high privileges.

  10. Security Tool Configuration and Weaknesses: Attempts to modify security tool configurations, such as disabling Defender or firewall settings, to evade detection and restrictions.

  11. Sensitive Information Extraction: Tries to extract sensitive information like WiFi profiles and passwords, user personal info, and SSH keys, which could be used for further attacks.

  12. Remote Access and User Account Creation: Attempts to create new user account “hacker” with password “Hacker123!" with administrative privileges and enable remote desktop access, directly compromising the system's security.

  13. Defeating Security Defenses: Performs various actions aimed at defeating Windows Defender, Windows Firewall, App and Browser Control, and other security measures to maintain access and evade detection.

  14. SSH and PuTTY Configurations: Extracts SSH agent keys, PuTTY session information, and SSH host keys, which might be used for unauthorized access to other systems.

  15. Web Server Configuration Files: Searches for web.config files in common web server directories (inetpub, xampp) that could contain sensitive application settings or database connection strings.

  16. SNMP Configuration: Checks the Simple Network Management Protocol (SNMP) configuration for potential misuse or information disclosure.

  17. Network Shares and Mapping: Lists network shares, attempts to map them locally, and queries domain shares, which could expose sensitive information or be leveraged for lateral movement.

  18. Software and Registry Enumeration: Lists installed software and queries registry keys related to software, startup programs, and third-party drivers, looking for vulnerable applications or misconfigurations.

  19. Miscellaneous: Includes actions like checking for third-party drivers, viewing the hosts file, and retrieving the contents of the clipboard, which could contain sensitive information.

Usage

No need to clone just download the Binary from Releases and run awpes3.exe in CMD.

NOTE: To make the most of it, run it as Administrator in CMD.

Screenshot 2024-03-05 at 4 01 33 PM

Donate

. BTC: bc1qykzfyjdkyck5v4sd46j4y8ra6mgltvu6zqu69s

Disclamer

The developer retains the copyright to the script uploaded on this repository. This script is provided for educational and informational purposes only.

The developer makes no representations or warranties regarding the accuracy or completeness of the script. Users downloading or utilizing the script do so at their own risk and discretion. The developer shall not be liable for any direct, indirect, incidental, special, or consequential damages arising out of the use or inability to use the script.

By downloading or using the script, you agree to abide by the terms and conditions mentioned here. If you have any questions or need further information, please contact the developer Smridh Gupta, Email- [email protected].

Contact

[email protected]

Developed by @smridhgupta

About

Windows Privilege Escalation Tool

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published