WinPEAS - Windows Privilege Escalation Tool for Ethical Hackers & Pentesters
Supercharge your ethical hacking with WinPEAS, the ultimate tool for uncovering Windows vulnerabilities.
About WinPEAS
In the world of ethical hacking and bug bounty hunting, privilege escalation is a vital post-exploitation phase. Once an attacker gains initial access (usually as a low-privileged user), the next objective is often to escalate privileges — to administrator on Windows or root on Linux.
This is where WinPEAS and LinPEAS come into play. These automated enumeration tools are designed to uncover misconfigurations and vulnerabilities that could lead to higher privilege access.
Key Features of WinPEAS
Comprehensive Enumeration
Scans services, registry, files, and credentials in one go.
Color-Coded Output
Scans services, registry, files, and credentials in one go.
Lightweight Executable
32-bit and 64-bit versions for easy deployment.
Regular Updates
Actively maintained with new checks added often.
Open Source
Free under MIT license with community support.
Offline Analysis
Save output for detailed, noise-free review.
Why WinPEAS is Used

WinPEAS is the go-to tool for ethical hackers and bug bounty hunters, streamlining privilege escalation with unmatched efficiency.
- Automation: Saves hours by automating manual enumeration tasks.
- Accuracy: Detects obscure issues like unquoted paths or weak permissions.
- Versatility: Supports Windows XP to Windows 11.
- Community-Driven: Regular updates from a vibrant open-source community.
- Cost-Free: Completely free, accessible to all ethical hackers.
Common Vulnerabilities Found
WinPEAS excels at identifying exploitable misconfigurations in Windows systems. Here are common issues it uncovers:
Unquoted Service Paths
- Services with unquoted paths (e.g., C:\Program Files\My Service\service.exe) can allow malicious executable placement.
Weak Service Permissions
- Services editable by low-privileged users can be modified to execute malicious code.
Always Install Elevated
- Registry keys allowing MSI files to run with admin privileges.
Credentials in Files
- Exposed passwords or keys in configuration files or scripts.
Download & Installation
WinPEAS is free and open-source, available for download from the official repository. Follow these steps to get started:
1. Visit the Official Repository: Go to the WinPEAS.com to access the latest releases.
2. Download WinPEAS: Choose the appropriate executable based on your target system’s architecture:
winPEASx64.exe
for 64-bit systems
winPEASx86.exe
for 32-bit systems
Download directly from the releases page.
3. Transfer to Target: Use a method like:
certutil -urlcache -split -f https://WinPEAS.com/carlospolop/PEASS-ng/releases/latest/download/winPEASx64.exe winpeas.exe
- Alternatively, use a reverse shell, SMB share, or a simple HTTP server (e.g., Python’s
python -m http.server
).
4. Verify Integrity: Check the file’s hash (provided on the WinPEAS releases page) to ensure it hasn’t been tampered with.
5. Prepare for Execution: No installation is required—WinPEAS is a standalone executable. Ensure it has execution permissions on the target system.

Practical Example
Unquoted Service Path Exploit: WinPEAS may detect:
- C:\Program Files\My Service\service.exe
- If C:\Program Files\My.exe is writable, place a malicious My.exe to gain administrator privileges when the service starts.
Use Case Scenarios
Penetration Testing
Quickly identify weak service permissions during a client assessment to escalate from user to admin.
Bug Bounty Hunting
Uncover misconfigurations like AlwaysInstallElevated to gain high-impact vulnerabilities.
Red Team Engagements
Use WinPEAS to find DLL hijacking opportunities for stealthy privilege escalation.
CTF Challenges
Speed up Capture The Flag challenges by automating Windows enumeration.
What Hackers Say
"WinPEAS turned a tough pentest into a quick win. Found a weak service in seconds!"
Alex, Penetration Tester
"The color-coded output makes spotting vulnerabilities so easy. A must-have!"
Sarah, Bug Bounty Hunter
"As a newbie, WinPEAS taught me how to escalate privileges effectively."
Jamie, Cybersecurity Student
Tips for Effective Use
- Download the latest WinPEAS from WinPEAS.com
- Filter output with findstr "WARNING Interesting" for quick insights.
- Run as a low-privileged user to find realistic escalation paths.
- Be cautious in stealthy engagements, as WinPEAS can be noisy.
Community & Support
WinPEAS thrives thanks to its active open-source community. Get involved or seek support through these channels:
WinPEAS Repository
Access the latest releases and contribute at WinPEAS.com
Community Forums
Join discussions on platforms like Reddit or Discord to share tips and ask questions.
Issue Tracker
Report bugs or suggest features via the WinPEAS.com issue tracker.
Ethical Considerations
WinPEAS is for authorized testing only. Unauthorized use on systems without explicit permission is illegal and unethical. Always follow ethical hacking guidelines and secure written consent.
Frequently Asked Questions (FAQs)
What is WinPEAS?
WinPEAS (Windows Privilege Escalation Awesome Script) is an automated enumeration tool used to identify misconfigurations and vulnerabilities that could lead to privilege escalation on Windows systems.
Is WinPEAS free and open-source?
Yes, WinPEAS is completely free and open-source. It’s maintained on GitHub as part of the PEASS-ng project.
Who developed WinPEAS?
WinPEAS was developed by carlospolop, a cybersecurity professional and contributor to the PEASS-ng toolkit.
What does WinPEAS check for?
WinPEAS checks for service misconfigurations, weak registry permissions, AlwaysInstallElevated keys, unquoted service paths, SUID files, credentials in files, and more.
What versions of Windows does WinPEAS support?
WinPEAS supports most modern Windows versions, including Windows 7, 8, 10, and Windows Server editions.
How do I download WinPEAS?
You can download the latest WinPEAS binaries directly from the PEASS-ng GitHub Releases.
How do I run WinPEAS on a target system?
Upload the executable (e.g., winPEASx64.exe) to the compromised system and run it via command line:
.\winpeas.exe
What output does WinPEAS generate?
WinPEAS provides color-coded terminal output and can be redirected to a file for offline analysis. It highlights potential privilege escalation vectors.
What are the different versions of WinPEAS?
There are two main versions: winPEASx64.exe for 64-bit systems and winPEASx86.exe for 32-bit systems.
Can I use WinPEAS on a system without admin rights?
Yes, WinPEAS is designed to run with low-privileged user permissions to discover possible escalation paths.
Is WinPEAS safe to run on production systems?
While WinPEAS does not exploit anything, it can trigger alerts. Only run it on systems where you have explicit permission.
Does WinPEAS require installation?
No, WinPEAS is a portable executable and does not require installation.
Can antivirus software detect or block WinPEAS?
Yes, some antivirus programs may flag it as a hacking tool. You may need to bypass AV or use evasion techniques.
How often is WinPEAS updated?
WinPEAS is actively maintained and frequently updated with new checks and features. It’s recommended to always use the latest release.
What is the difference between WinPEAS and LinPEAS?
WinPEAS is for Windows privilege escalation, while LinPEAS is its Linux counterpart. Both belong to the same PEASS-ng suite.
Can WinPEAS be used in Capture the Flag (CTF) challenges?
Yes, WinPEAS is commonly used in CTF platforms like Hack The Box and TryHackMe to quickly enumerate privilege escalation vectors on Windows machines
What is the best way to analyze WinPEAS output?
Use keyword filtering with tools like findstr or open the saved output in a text editor and search for terms like “Interesting”, “Writable”, or “Vulnerable”.
What kind of privilege escalation vectors can WinPEAS detect?
It can detect registry misconfigurations, insecure services, token impersonation opportunities, vulnerable scheduled tasks, and stored credentials.
Can I customize the WinPEAS scan?
Yes, advanced users can modify the source code or choose specific scan modes using command-line arguments like winpeas.exe quiet or winpeas.exe systeminfo.
Does WinPEAS require internet access to run?
No, WinPEAS runs completely offline. However, if it suggests kernel exploits or external references, you may need internet access for follow-up research.