windows-discovery
OfficialDiscover Windows privesc vectors
Software Engineering#privilege escalation#windows#system hardening#enumeration#post-exploitation#red teaming
Authorblacklanternsecurity
Version1.0.0
Installs0
System Documentation
What problem does it solve?
This Skill helps penetration testers identify potential pathways to escalate privileges on Windows systems by enumerating configurations, services, and user contexts.
Core Features & Use Cases
- System Enumeration: Gathers essential system information like OS version, architecture, and hotfixes.
- Privilege Analysis: Checks user token privileges and group memberships for escalation opportunities.
- Service Misconfiguration Detection: Identifies unquoted service paths, writable service binaries, and other service-related vulnerabilities.
- Credential Hunting: Performs quick scans for stored credentials in various locations.
- Use Case: After gaining initial access to a Windows machine, run this Skill to quickly find common misconfigurations that allow a low-privileged user to become an administrator.
Quick Start
Use the windows-discovery skill to enumerate potential privilege escalation vectors on the current Windows host.
Dependency Matrix
Required Modules
None requiredComponents
scriptsreferences
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: windows-discovery Download link: https://github.com/blacklanternsecurity/red-run/archive/main.zip#windows-discovery Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.