Windows Privilege Escalation
This skill automates Windows privilege escalation techniques, streamlining reconnaissance and potentially bypassing security controls for advanced analysis.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add zebbern-windows-privilege-escalation npx -- -y @trustedskills/zebbern-windows-privilege-escalation
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"zebbern-windows-privilege-escalation": {
"command": "npx",
"args": [
"-y",
"@trustedskills/zebbern-windows-privilege-escalation"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
This skill enables AI agents to analyze Windows systems for misconfigurations and vulnerabilities that allow escalation from lower privileges to SYSTEM or Administrator rights. It automates the discovery of unpatched exploits, weak service configurations, and token manipulation techniques specific to the Windows operating system.
When to use it
- Post-exploitation analysis: After gaining initial access via phishing or brute force, verify if you can elevate to full control.
- Red teaming simulations: Test defense-in-depth strategies by attempting to bypass User Account Control (UAC) restrictions.
- Vulnerability assessment: Identify unpatched software versions or disabled security features like PatchGuard that agents could exploit.
- Incident response: Determine the scope of compromise when an attacker has a low-level token on a critical server.
Key capabilities
- Scans for known Windows privilege escalation vectors (e.g., Service0, PrintNightmare).
- Checks for misconfigured services with high privileges running under standard user accounts.
- Identifies unpatched vulnerabilities in installed applications and drivers.
- Detects weak token manipulation opportunities via impersonation or duplication.
Example prompts
- "Scan this Windows environment for privilege escalation paths from a standard user account."
- "Identify any unpatched services or drivers that could allow SYSTEM-level access."
- "Analyze the current user's token and suggest methods to escalate privileges if possible."
Tips & gotchas
Ensure you have explicit authorization before running this skill on production systems, as it may trigger security alerts or violate compliance policies. This tool is designed for defensive testing; misuse can lead to legal consequences and system instability.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.