Skip to main content
Back to registry

windows-privilege-escalation

sickn33/antigravity-awesome-skills

Provide systematic methodologies for discovering and exploiting privilege escalation vulnerabilities on Windows systems during penetration testing engagements. This skill covers system enumeration, credential harvesting, service exploitation, token impersonation, kernel exploits, and various misconfigurations that...

Installs41
Install command
npx skills add https://github.com/sickn33/antigravity-awesome-skills --skill windows-privilege-escalation
Security audits
Gen Agent Trust HubFAIL
SocketWARN
SnykFAIL
About this skill
Provide systematic methodologies for discovering and exploiting privilege escalation vulnerabilities on Windows systems during penetration testing engagements. This skill covers system enumeration, credential harvesting, service exploitation, token impersonation, kernel exploits, and various misconfigurations that enable escalation from standard user to Administrator or SYSTEM privileges. This skill is applicable to execute the workflow or actions described in the overview. - Initial Access : Shell or RDP access as standard user on Windows system - Enumeration Tools : WinPEAS, PowerUp, Seatbelt, or manual commands - Exploit Binaries : Pre-compiled exploits or ability to transfer tools - Knowledge : Understanding of Windows security model and privileges - Authorization : Written permission for penetration testing activities - Privilege Escalation Path : Identified vector to higher privileges - Credential Dump : Harvested passwords, hashes, or tokens - Elevated Shell : Command execution as Administrator or SYSTEM - Vulnerability Report : Documentation of misconfigurations and exploits - Remediation Recommendations : Fixes for identified weaknesses - Kernel exploits may cause system instability - Some exploits require specific Windows versions - AV/EDR may detect and block common tools - Token impersonation requires service account context - Some techniques require GUI access -...

Source description provided by the upstream skill listing. Community reviews and install context appear in the sections below.

Community Reviews

Latest reviews

Sign in to review

No community reviews yet. Be the first to review.

Browse this skill in context
FAQ
What does windows-privilege-escalation do?

Provide systematic methodologies for discovering and exploiting privilege escalation vulnerabilities on Windows systems during penetration testing engagements. This skill covers system enumeration, credential harvesting, service exploitation, token impersonation, kernel exploits, and various misconfigurations that...

Is windows-privilege-escalation good?

windows-privilege-escalation does not have approved reviews yet, so SkillJury cannot publish a community verdict.

What agent does windows-privilege-escalation work with?

windows-privilege-escalation currently lists compatibility with codex, gemini-cli, opencode, kimi-cli, amp, github-copilot.

What are alternatives to windows-privilege-escalation?

Skills in the same category include telegram-bot-builder, flutter-app-size, sharp-edges, iterative-retrieval.

How do I install windows-privilege-escalation?

npx skills add https://github.com/sickn33/antigravity-awesome-skills --skill windows-privilege-escalation

Related skills

More from sickn33/antigravity-awesome-skills

Related skills

Alternatives in Software Engineering