Windows Privilege Escalation
This skill should be used when the user asks to "escalate privileges on Windows," "find Windows privesc vectors," "enumerate Windows for privilege escalation," "exploit Windows misconfigurations," or "perform post-exploitation privilege escalation." It provides comprehensive guidance for discovering and exploiting privilege escalation vulnerabilities in Windows environments.
Packaged view
This page reorganizes the original catalog entry around fit, installability, and workflow context first. The original raw source lives below.
Install command
npx @skill-hub/cli install zebbern-claude-code-guide-windows-privilege-escalation
Repository
Skill path: skills/windows-privilege-escalation
This skill should be used when the user asks to "escalate privileges on Windows," "find Windows privesc vectors," "enumerate Windows for privilege escalation," "exploit Windows misconfigurations," or "perform post-exploitation privilege escalation." It provides comprehensive guidance for discovering and exploiting privilege escalation vulnerabilities in Windows environments.
Open repositoryBest for
Primary workflow: Ship Full Stack.
Technical facets: Full Stack.
Target audience: Development teams looking for install-ready agent workflows..
License: Unknown.
Original source
Catalog source: SkillHub Club.
Repository owner: zebbern.
This is still a mirrored public skill entry. Review the repository before installing into production workflows.
What it helps with
- Install Windows Privilege Escalation into Claude Code, Codex CLI, Gemini CLI, or OpenCode workflows
- Review https://github.com/zebbern/claude-code-guide before adding Windows Privilege Escalation to shared team environments
- Use Windows Privilege Escalation for development workflows
Works across
Favorites: 0.
Sub-skills: 0.
Aggregator: No.