Windows Privilege Escalation

🌐Community
by sickn33 · vlatest · Repository

This skill automates Windows privilege escalation techniques, streamlining reconnaissance and potentially gaining elevated access to systems.

Install on your platform

We auto-selected Claude Code based on this skill’s supported platforms.

1

Run in terminal (recommended)

terminal
claude mcp add windows-privilege-escalation npx -- -y @trustedskills/windows-privilege-escalation
2

Or manually add to ~/.claude/settings.json

~/.claude/settings.json
{
  "mcpServers": {
    "windows-privilege-escalation": {
      "command": "npx",
      "args": [
        "-y",
        "@trustedskills/windows-privilege-escalation"
      ]
    }
  }
}

Requires Claude Code (claude CLI). Run claude --version to verify your install.

About This Skill

What it does

This skill enables AI agents to identify and execute privilege escalation techniques specifically targeting Windows operating systems. It assists in moving from standard user accounts to higher-level administrative access by leveraging system vulnerabilities and misconfigurations.

When to use it

  • During penetration testing engagements where initial access is limited to a low-privilege user account on a Windows target.
  • When auditing internal Windows environments to verify that privilege escalation vectors are properly mitigated or patched.
  • To automate the detection of common Windows-specific flaws such as unpatched services or weak token handling.

Key capabilities

  • Scans for known Windows privilege escalation vulnerabilities.
  • Analyzes system configurations for misconfigurations allowing elevation.
  • Executes specific payloads to gain administrative rights on compromised hosts.

Example prompts

  • "Scan this Windows environment for available privilege escalation paths starting from a standard user context."
  • "Identify unpatched services that could be exploited to escalate privileges on this target machine."
  • "Generate a report on potential token manipulation techniques applicable to the current Windows version detected."

Tips & gotchas

Ensure you have explicit authorization before running escalation checks, as these actions can modify system integrity or trigger security alerts. The skill relies on accurate OS detection; false positives may occur if the target environment differs from expected configurations.

Tags

🛡️

TrustedSkills Verification

Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.

Security Audits

Gen Agent Trust HubPass
SocketPass
SnykPass

Details

Version
vlatest
License
Author
sickn33
Installs
180

🌐 Community

Passed automated security scans.