·windows privilege escalation
</>

windows privilege escalation

sebas-aikon-intelligence/antigravity-awesome-skills

This skill should be used when the user asks to "escalate privileges on Windows," "find Windows privesc vectors," "enumerate Windows for privilege escalation," "exploit Windows misconfigurations," or "perform post-exploitation privilege escalation." It provides comprehensive guidance for discovering and exploiting privilege escalation vulnerabilities in Windows environments.

3Installs·0Trend·@sebas-aikon-intelligence

Installation

$npx skills add https://github.com/sebas-aikon-intelligence/antigravity-awesome-skills --skill windows privilege escalation

SKILL.md

Provide systematic methodologies for discovering and exploiting privilege escalation vulnerabilities on Windows systems during penetration testing engagements. This skill covers system enumeration, credential harvesting, service exploitation, token impersonation, kernel exploits, and various misconfigurations that enable escalation from standard user to Administrator or SYSTEM privileges.

| WinPEAS | winPEAS.exe | Comprehensive enumeration | | PowerUp | Invoke-AllChecks | Service/path vulnerabilities | | Seatbelt | Seatbelt.exe -group=all | Security audit checks | | Watson | Watson.exe | Missing patches | | JAWS | .\jaws-enum.ps1 | Legacy Windows enum | | PrivescCheck | Invoke-PrivescCheck | Privilege escalation checks |

| Unquoted paths | wmic service get pathname \| findstr /i /v """ | | Weak service perms | accesschk.exe -uwcqv "Everyone" | | AlwaysInstallElevated | reg query HKCU\...\Installer /v AlwaysInstallElevated | | Stored credentials | cmdkey /list | | Token privileges | whoami /priv | | Scheduled tasks | schtasks /query /fo LIST /v |

View raw

Facts (cite-ready)

Stable fields and commands for AI/search citations.

Install command
npx skills add https://github.com/sebas-aikon-intelligence/antigravity-awesome-skills --skill windows privilege escalation
Category
</>Dev Tools
Verified
First Seen
2026-02-01
Updated
2026-02-18

Quick answers

What is windows privilege escalation?

This skill should be used when the user asks to "escalate privileges on Windows," "find Windows privesc vectors," "enumerate Windows for privilege escalation," "exploit Windows misconfigurations," or "perform post-exploitation privilege escalation." It provides comprehensive guidance for discovering and exploiting privilege escalation vulnerabilities in Windows environments. Source: sebas-aikon-intelligence/antigravity-awesome-skills.

How do I install windows privilege escalation?

Open your terminal or command line tool (Terminal, iTerm, Windows Terminal, etc.) Copy and run this command: npx skills add https://github.com/sebas-aikon-intelligence/antigravity-awesome-skills --skill windows privilege escalation Once installed, the skill will be automatically configured in your AI coding environment and ready to use in Claude Code or Cursor

Where is the source repository?

https://github.com/sebas-aikon-intelligence/antigravity-awesome-skills