This skill should be used when the user asks to "escalate privileges", "get root access", "become administrator", "privesc techniques", "abuse sudo", "exploit SUID binaries", "Kerberoasting", "pass-the-ticket", "token impersonation", or needs guidance on post-exploitation privilege escalation for Linux or Windows systems.
8.1
Rating
0
Installs
Security
Category
Excellent comprehensive skill for privilege escalation covering Linux, Windows, and Active Directory environments. The description clearly articulates when to invoke the skill with specific trigger phrases. Task knowledge is exceptional with detailed commands, tool usage, and practical examples across multiple attack vectors. Structure is strong with logical categorization by OS and technique type, quick reference tables, and troubleshooting guidance. Novelty is moderate-to-high: while individual techniques are well-documented online, consolidating this breadth of cross-platform privilege escalation methods with ready-to-use commands into a single queryable skill meaningfully reduces token cost and cognitive load for a CLI agent that would otherwise need to synthesize information from multiple sources or construct complex queries.
Loading SKILL.md…