windows-token-impersonation

Official

Escalate Windows privileges via token abuse.

Authorblacklanternsecurity
Version1.0.0
Installs0

System Documentation

What problem does it solve?

This Skill helps penetration testers escalate privileges on Windows systems by exploiting token privileges, allowing them to gain SYSTEM-level access.

Core Features & Use Cases

  • Token Privilege Exploitation: Leverages dangerous privileges like SeImpersonatePrivilege and SeDebugPrivilege.
  • Potato Exploit Variants: Supports multiple "Potato" tools (JuicyPotato, PrintSpoofer, GodPotato, etc.) tailored to different Windows versions and architectures.
  • Use Case: After gaining initial low-privilege access, use this Skill to exploit a service account's token to become the SYSTEM user, granting full control over the machine.

Quick Start

Use the windows-token-impersonation skill to exploit SeImpersonatePrivilege on the target system.

Dependency Matrix

Required Modules

None required

Components

scriptsreferences

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: windows-token-impersonation
Download link: https://github.com/blacklanternsecurity/red-run/archive/main.zip#windows-token-impersonation

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.