windows-token-impersonation
OfficialEscalate Windows privileges via token abuse.
Software Engineering#privilege escalation#windows#system#token impersonation#active directory#potato exploit
Authorblacklanternsecurity
Version1.0.0
Installs0
System Documentation
What problem does it solve?
This Skill helps penetration testers escalate privileges on Windows systems by exploiting token privileges, allowing them to gain SYSTEM-level access.
Core Features & Use Cases
- Token Privilege Exploitation: Leverages dangerous privileges like SeImpersonatePrivilege and SeDebugPrivilege.
- Potato Exploit Variants: Supports multiple "Potato" tools (JuicyPotato, PrintSpoofer, GodPotato, etc.) tailored to different Windows versions and architectures.
- Use Case: After gaining initial low-privilege access, use this Skill to exploit a service account's token to become the SYSTEM user, granting full control over the machine.
Quick Start
Use the windows-token-impersonation skill to exploit SeImpersonatePrivilege on the target system.
Dependency Matrix
Required Modules
None requiredComponents
scriptsreferences
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: windows-token-impersonation Download link: https://github.com/blacklanternsecurity/red-run/archive/main.zip#windows-token-impersonation Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.