This is the Windows app named PrivescCheck whose latest release can be downloaded as 2025.10.06-1sourcecode.tar.gz. It can be run online in the free hosting provider OnWorks for workstations.
Download and run online this app named PrivescCheck with OnWorks for free.
Follow these instructions in order to run this app:
- 1. Downloaded this application in your PC.
- 2. Enter in our file manager https://www.onworks.net/myfiles.php?username=XXXXX with the username that you want.
- 3. Upload this application in such filemanager.
- 4. Start any OS OnWorks online emulator from this website, but better Windows online emulator.
- 5. From the OnWorks Windows OS you have just started, goto our file manager https://www.onworks.net/myfiles.php?username=XXXXX with the username that you want.
- 6. Download the application and install it.
- 7. Download Wine from your Linux distributions software repositories. Once installed, you can then double-click the app to run them with Wine. You can also try PlayOnLinux, a fancy interface over Wine that will help you install popular Windows programs and games.
Wine is a way to run Windows software on Linux, but with no Windows required. Wine is an open-source Windows compatibility layer that can run Windows programs directly on any Linux desktop. Essentially, Wine is trying to re-implement enough of Windows from scratch so that it can run all those Windows applications without actually needing Windows.
SCREENSHOTS:
PrivescCheck
DESCRIPTION:
PrivescCheck is a local privilege escalation reconnaissance tool for Unix-like systems that automates common checks auditors and system owners run when looking for misconfigurations. It enumerates kernel versions, installed packages, SUID/SGID binaries, world-writable files and directories, services, cron jobs, and user/group permissions to highlight likely escalation paths. The output is organized and human-readable so operators can triage findings quickly—flagging high-risk items separately from informational noise. Designed for defenders as much as red-teamers, it helps turn ad-hoc manual checks into repeatable scans that surface systemic mistakes (for example, left-over build scripts or insecure service configs). Because it focuses on discovery rather than exploitation, it’s useful in hardening exercises, audits, and incident response to identify what an intruder might leverage.
Features
- Detects misconfigurations and potential privilege escalation vectors due to Windows configuration or bad practices
- Supports different “modes” of scanning: basic vs extended vs audit; ability to generate human-readable plus machine readable report formats
- Standalone script (single .ps1 file) so can be copied and run without cloning entire repo
- Ability to run dot-sourced so that functions/cmdlets are available in current session; supports bypassing execution policy etcetera
- Reports in multiple formats: e.g. TXT and HTML; optionally CSV, XML etcetera for parsing and audit automation
- Useful even when not running as administrator; some checks still possible under limited privileges; reports risk etcetera with gradation
Programming Language
PowerShell
Categories
This is an application that can also be fetched from https://sourceforge.net/projects/privesccheck.mirror/. It has been hosted in OnWorks in order to be run online in an easiest way from one of our free Operative Systems.