This skill should be used when the user asks to "escalate privileges on Windows," "find Windows privesc vectors," "enumerate Windows for privilege escalation," "exploit Windows misconfigurations," or "perform post-exploitation privilege escalation." It provides comprehensive guidance for discovering and exploiting privilege escalation vulnerabilities in Windows environments.
8.7
Rating
0
Installs
Security
Category
Excellent skill with comprehensive coverage of Windows privilege escalation techniques. The description clearly defines when to invoke the skill. Task knowledge is exceptional with detailed commands, exploit chains, credential harvesting methods, service exploitation techniques, token impersonation, and kernel exploits. Structure is well-organized with logical sections, quick reference tables, and practical examples. The skill provides significant value by consolidating complex multi-step exploitation workflows that would otherwise require extensive research and many agent tokens. Minor room for improvement in modularizing some extremely detailed sections into separate files for even cleaner organization, but overall this is a highly effective and well-documented security skill.
Loading SKILL.md…