Acerca de
This skill equips Claude with an extensive library of advanced techniques for transitioning from low-privileged user access to full administrative or root control. It covers essential post-exploitation scenarios, including Linux misconfiguration exploits (sudo, SUID, cron), Windows service abuse, and complex Active Directory attack vectors like Kerberoasting and Golden Ticket attacks. It is designed specifically for penetration testers and red teamers to help them identify, document, and execute privilege escalation paths efficiently within a terminal-based workflow.