Windows Privilege Escalation

🌐Community
by zebbern · vlatest · Repository

This skill automates Windows privilege escalation techniques, streamlining reconnaissance and potentially bypassing security controls for advanced analysis.

Install on your platform

We auto-selected Claude Code based on this skill’s supported platforms.

1

Run in terminal (recommended)

terminal
claude mcp add zebbern-windows-privilege-escalation npx -- -y @trustedskills/zebbern-windows-privilege-escalation
2

Or manually add to ~/.claude/settings.json

~/.claude/settings.json
{
  "mcpServers": {
    "zebbern-windows-privilege-escalation": {
      "command": "npx",
      "args": [
        "-y",
        "@trustedskills/zebbern-windows-privilege-escalation"
      ]
    }
  }
}

Requires Claude Code (claude CLI). Run claude --version to verify your install.

About This Skill

What it does

This skill enables AI agents to analyze Windows systems for misconfigurations and vulnerabilities that allow escalation from lower privileges to SYSTEM or Administrator rights. It automates the discovery of unpatched exploits, weak service configurations, and token manipulation techniques specific to the Windows operating system.

When to use it

  • Post-exploitation analysis: After gaining initial access via phishing or brute force, verify if you can elevate to full control.
  • Red teaming simulations: Test defense-in-depth strategies by attempting to bypass User Account Control (UAC) restrictions.
  • Vulnerability assessment: Identify unpatched software versions or disabled security features like PatchGuard that agents could exploit.
  • Incident response: Determine the scope of compromise when an attacker has a low-level token on a critical server.

Key capabilities

  • Scans for known Windows privilege escalation vectors (e.g., Service0, PrintNightmare).
  • Checks for misconfigured services with high privileges running under standard user accounts.
  • Identifies unpatched vulnerabilities in installed applications and drivers.
  • Detects weak token manipulation opportunities via impersonation or duplication.

Example prompts

  • "Scan this Windows environment for privilege escalation paths from a standard user account."
  • "Identify any unpatched services or drivers that could allow SYSTEM-level access."
  • "Analyze the current user's token and suggest methods to escalate privileges if possible."

Tips & gotchas

Ensure you have explicit authorization before running this skill on production systems, as it may trigger security alerts or violate compliance policies. This tool is designed for defensive testing; misuse can lead to legal consequences and system instability.

Tags

🛡️

TrustedSkills Verification

Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.

Security Audits

Gen Agent Trust HubPass
SocketPass
SnykPass

Details

Version
vlatest
License
Author
zebbern
Installs
28

🌐 Community

Passed automated security scans.