Windows Privilege Escalation

🌐Community
by davila7 · vlatest · Repository

This skill simulates a Windows privilege escalation attack to understand vulnerabilities and improve security defenses.

Install on your platform

We auto-selected Claude Code based on this skill’s supported platforms.

1

Run in terminal (recommended)

terminal
claude mcp add davila7-windows-privilege-escalation npx -- -y @trustedskills/davila7-windows-privilege-escalation
2

Or manually add to ~/.claude/settings.json

~/.claude/settings.json
{
  "mcpServers": {
    "davila7-windows-privilege-escalation": {
      "command": "npx",
      "args": [
        "-y",
        "@trustedskills/davila7-windows-privilege-escalation"
      ]
    }
  }
}

Requires Claude Code (claude CLI). Run claude --version to verify your install.

About This Skill

The Windows Privilege Escalation skill empowers AI agents to analyze local Windows environments for security vulnerabilities. It systematically identifies misconfigurations, unpatched services, and weak permissions that allow attackers to gain higher system access.

When to use it

  • Assessing the security posture of a compromised Windows workstation during a penetration test.
  • Identifying potential attack vectors in legacy systems running outdated service packs or drivers.
  • Auditing user account configurations for excessive privileges or disabled security features like User Account Control (UAC).
  • Validating the effectiveness of patch management policies by checking for known unpatched exploits.

Key capabilities

  • Scans local system files and registry keys for common privilege escalation vectors.
  • Checks service configurations for misconfigurations, such as missing binaries or weak permissions.
  • Analyzes user group memberships to detect accounts with unnecessary administrative rights.
  • Identifies running processes that could be exploited via known vulnerabilities.

Example prompts

  • "Scan this Windows system for local privilege escalation vulnerabilities and list the highest risk findings."
  • "Check if User Account Control is properly configured and identify any services running as SYSTEM unnecessarily."
  • "Analyze the current user's group memberships and suggest ways to reduce their attack surface."

Tips & gotchas

Ensure you have appropriate permissions or are operating in a controlled lab environment, as scanning may require elevated privileges. This skill focuses on local analysis and does not interact with remote systems or networks.

Tags

🛡️

TrustedSkills Verification

Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.

Security Audits

Gen Agent Trust HubPass
SocketPass
SnykPass

Details

Version
vlatest
License
Author
davila7
Installs
94

🌐 Community

Passed automated security scans.