Windows Privilege Escalation
This skill automates Windows privilege escalation techniques, streamlining reconnaissance and potentially gaining elevated access to systems.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add windows-privilege-escalation npx -- -y @trustedskills/windows-privilege-escalation
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"windows-privilege-escalation": {
"command": "npx",
"args": [
"-y",
"@trustedskills/windows-privilege-escalation"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
This skill enables AI agents to identify and execute privilege escalation techniques specifically targeting Windows operating systems. It assists in moving from standard user accounts to higher-level administrative access by leveraging system vulnerabilities and misconfigurations.
When to use it
- During penetration testing engagements where initial access is limited to a low-privilege user account on a Windows target.
- When auditing internal Windows environments to verify that privilege escalation vectors are properly mitigated or patched.
- To automate the detection of common Windows-specific flaws such as unpatched services or weak token handling.
Key capabilities
- Scans for known Windows privilege escalation vulnerabilities.
- Analyzes system configurations for misconfigurations allowing elevation.
- Executes specific payloads to gain administrative rights on compromised hosts.
Example prompts
- "Scan this Windows environment for available privilege escalation paths starting from a standard user context."
- "Identify unpatched services that could be exploited to escalate privileges on this target machine."
- "Generate a report on potential token manipulation techniques applicable to the current Windows version detected."
Tips & gotchas
Ensure you have explicit authorization before running escalation checks, as these actions can modify system integrity or trigger security alerts. The skill relies on accurate OS detection; false positives may occur if the target environment differs from expected configurations.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.