windows privilege escalation
✓This skill should be used when the user asks to "escalate privileges on Windows," "find Windows privesc vectors," "enumerate Windows for privilege escalation," "exploit Windows misconfigurations," or "perform post-exploitation privilege escalation." It provides comprehensive guidance for discovering and exploiting privilege escalation vulnerabilities in Windows environments.
Installation
SKILL.md
Provide systematic methodologies for discovering and exploiting privilege escalation vulnerabilities on Windows systems during penetration testing engagements. This skill covers system enumeration, credential harvesting, service exploitation, token impersonation, kernel exploits, and various misconfigurations that enable escalation from standard user to Administrator or SYSTEM privileges.
| WinPEAS | winPEAS.exe | Comprehensive enumeration | | PowerUp | Invoke-AllChecks | Service/path vulnerabilities | | Seatbelt | Seatbelt.exe -group=all | Security audit checks | | Watson | Watson.exe | Missing patches | | JAWS | .\jaws-enum.ps1 | Legacy Windows enum | | PrivescCheck | Invoke-PrivescCheck | Privilege escalation checks |
| Unquoted paths | wmic service get pathname \| findstr /i /v """ | | Weak service perms | accesschk.exe -uwcqv "Everyone" | | AlwaysInstallElevated | reg query HKCU\...\Installer /v AlwaysInstallElevated | | Stored credentials | cmdkey /list | | Token privileges | whoami /priv | | Scheduled tasks | schtasks /query /fo LIST /v |
Facts (cite-ready)
Stable fields and commands for AI/search citations.
- Install command
npx skills add https://github.com/sickn33/antigravity-awesome-skills --skill windows privilege escalation- Category
- </>Dev Tools
- Verified
- ✓
- First Seen
- 2026-02-01
- Updated
- 2026-02-18
Quick answers
What is windows privilege escalation?
This skill should be used when the user asks to "escalate privileges on Windows," "find Windows privesc vectors," "enumerate Windows for privilege escalation," "exploit Windows misconfigurations," or "perform post-exploitation privilege escalation." It provides comprehensive guidance for discovering and exploiting privilege escalation vulnerabilities in Windows environments. Source: sickn33/antigravity-awesome-skills.
How do I install windows privilege escalation?
Open your terminal or command line tool (Terminal, iTerm, Windows Terminal, etc.) Copy and run this command: npx skills add https://github.com/sickn33/antigravity-awesome-skills --skill windows privilege escalation Once installed, the skill will be automatically configured in your AI coding environment and ready to use in Claude Code or Cursor
Where is the source repository?
https://github.com/sickn33/antigravity-awesome-skills
Details
- Category
- </>Dev Tools
- Source
- skills.sh
- First Seen
- 2026-02-01