Windows Privilege Escalation
This skill demonstrates how to escalate Windows privileges using various techniques, aiding in understanding and potentially mitigating security vulnerabilities.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add hainamchung-windows-privilege-escalation npx -- -y @trustedskills/hainamchung-windows-privilege-escalation
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"hainamchung-windows-privilege-escalation": {
"command": "npx",
"args": [
"-y",
"@trustedskills/hainamchung-windows-privilege-escalation"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
This skill assists in identifying potential privilege escalation vulnerabilities on Windows systems. It can analyze system configurations and user rights assignments to pinpoint areas where an attacker could gain elevated privileges. The tool aims to provide actionable insights for security professionals performing penetration testing or vulnerability assessments.
When to use it
- During a red team engagement to identify opportunities for escalating privileges after initial access.
- As part of a vulnerability assessment to proactively discover misconfigurations that could lead to privilege escalation.
- When auditing user rights assignments and group memberships on Windows servers.
- To assist in recreating or validating exploit techniques related to privilege escalation.
Key capabilities
- Windows Privilege Escalation Analysis
- Vulnerability Identification
- Actionable Insights
- Security Assessment Support
Example prompts
- "Analyze this system for potential privilege escalation vulnerabilities."
- "What user rights assignments are potentially problematic?"
- "Identify any misconfigurations that could lead to privilege escalation."
Tips & gotchas
This skill requires a good understanding of Windows security concepts and terminology. The output should be interpreted by experienced security professionals, as it may contain false positives or require further investigation.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.