This skill should be used when the user asks to "escalate privileges on Linux", "find privesc vectors on Linux systems", "exploit sudo misconfigurations", "abuse SUID binaries", "exploit cron jobs for root access", "enumerate Linux systems for privilege escalation", or "gain root access from low-privilege shell". It provides comprehensive techniques for identifying and exploiting privilege escalation paths on Linux systems.
8.1
Rating
0
Installs
Security
Category
This is a comprehensive, well-structured skill for Linux privilege escalation. The description clearly indicates when to invoke it with specific trigger phrases. The skill provides exceptional task knowledge with detailed enumeration commands, exploitation techniques across 9 phases (kernel exploits, sudo, SUID, capabilities, cron jobs, PATH hijacking, NFS), concrete code examples, quick reference tables, and practical scenarios. The structure is logical and methodical, though the single-file format makes it lengthy; for a skill of this complexity, separating phases into referenced modules could improve navigability. Novelty is moderate: while comprehensive enumeration and multi-vector exploitation require significant effort manually, many techniques are well-documented in security resources like GTFOBins and PEASS, which the skill appropriately references. The skill meaningfully consolidates scattered knowledge into a systematic workflow that would otherwise require extensive token usage or manual research, justifying its existence as a packaged capability.
Loading SKILL.md…