Windows Privilege Escalation

Fail

Audited by Socket on Mar 4, 2026

11 alerts found:

Malwarex8Obfuscated Filex2Security
MalwareHIGH
sub-skills/example-5-credential-harvesting-from-registry.md

This fragment constitutes explicit malicious/hostile guidance: it teaches harvesting plaintext auto-logon credentials from the registry and how to use them for local elevation and remote command execution. The included troubleshooting content recommending obfuscation and AMSI/ExecutionPolicy bypasses further supports adversarial intent. Treat the file as high-risk operational attack guidance. Recommended mitigations: audit and remove plaintext DefaultPassword entries in Winlogon, disable auto-logon, rotate/force reset credentials, restrict registry read privileges, monitor for reg query and psexec/runas usage in logs, block or restrict psexec and similar lateral tooling, enable EDR detections for PowerShell bypass patterns and living-off-the-land abuse.

Confidence: 90%Severity: 95%
Obfuscated FileHIGH
sub-skills/6-additional-techniques.md

The code fragment is a high-risk offensive cheat-sheet describing actionable techniques for DLL hijacking, abusing stored Windows credentials with runas /savecred, and obtaining a root shell in WSL. It explicitly instructs how to compile and deploy malicious DLLs, abuse credential reuse to run remote executables, and change WSL defaults to gain root access. Treat this content as hostile guidance that enables privilege escalation and remote code execution; it should not be included in trusted packages or documentation without explicit defensive context.

Confidence: 98%
Obfuscated FileHIGH
sub-skills/5-kernel-exploitation.md

This file is an offensive, instructional guide for discovering and exploiting Windows kernel and local vulnerabilities. While it does not contain exploit payloads or obfuscated/malicious code, it explicitly instructs operators to gather system fingerprints, bypass PowerShell protections, and target high-impact CVEs. The snippet should be treated as potentially dangerous guidance: do not execute the commands on production systems and only use in authorized test/lab environments. Review and restrict distribution if exposure to unauthorized users is a concern.

Confidence: 98%
MalwareHIGH
sub-skills/example-4-unquoted-service-path.md

This code is an explicit local privilege escalation exploit leveraging an unquoted Windows service path plus writable service directory ACLs. It demonstrates discovery, placement of an attacker-controlled executable into a privileged path, and restarting the service to trigger execution — a high-confidence malicious recipe. Treat as hostile code; remediate by correcting service path quoting and fixing directory permissions.

Confidence: 90%Severity: 90%
MalwareHIGH
sub-skills/example-3-juicypotato-token-impersonation.md

This code is a deliberate exploit invocation: it uses JuicyPotato to impersonate a SYSTEM token and spawn a SYSTEM-level cmd.exe that runs netcat to establish a reverse shell to 10.10.10.10:4444. This is high-confidence malicious activity enabling full remote control of the host. Do not execute; if found on a system, assume compromise and follow incident response procedures (isolate, preserve evidence, remediate).

Confidence: 90%Severity: 95%
SecurityMEDIUM
SKILL.md

This skill is high-risk when considered in a software supply-chain and operational context. It provides detailed, actionable privilege escalation techniques that—while legitimate for authorized penetration testing—enable credential theft, persistence, and execution of untrusted binaries. Key risks: lack of enforced authorization, no guidance for trusted/signed tool sourcing, absence of secure handling for harvested secrets, and transitive risk from referenced sub-skills. Recommend gating distribution, restricting use to authorized testers, requiring signed/trusted tools, adding mandatory safety controls (secure storage, audited exfiltration, command whitelists), and auditing all referenced sub-skill contents before use.

Confidence: 75%Severity: 80%
MalwareHIGH
sub-skills/example-2-alwaysinstallelevated-exploitation.md

This code fragment is a clear, actionable exploit for privilege escalation via the AlwaysInstallElevated Windows Installer policy. It contains explicit steps to generate a malicious MSI with a reverse shell, stage and silently install it, and obtain a SYSTEM-level remote shell. Treat the snippet as malicious and actionable IoCs present (attacker IP/port, MSI filename, msfvenom/msiexec usage). Do not execute these commands on systems you do not own or have explicit authorization to test; remediate by ensuring AlwaysInstallElevated is disabled in both HKCU and HKLM and by monitoring for msiexec invoking MSI installs from user-writable locations.

Confidence: 90%Severity: 95%
MalwareHIGH
sub-skills/3-service-exploitation.md

This code is an explicit malicious exploitation guide for Windows post-exploitation: it contains step-by-step instructions to obtain privileged remote shells by abusing misconfigured service permissions, unquoted service paths, and the AlwaysInstallElevated policy. It should be treated as harmful guidance and not included in trusted codebases. Avoid executing these commands and remediate by locking down service ACLs, fixing unquoted paths, and disabling AlwaysInstallElevated.

Confidence: 95%Severity: 95%
MalwareHIGH
sub-skills/4-token-impersonation.md

This fragment is explicit offensive guidance for Windows privilege escalation using known 'Potato' exploits and for establishing reverse shells to a hardcoded attacker IP. It represents a serious supply-chain risk if included in distributed code or documentation because it provides actionable steps to obtain SYSTEM privileges and remote access. Treat as malicious/offensive content and do not execute on production or untrusted systems.

Confidence: 90%Severity: 95%
MalwareHIGH
sub-skills/2-credential-harvesting.md

This code fragment is a clearly malicious credential-harvesting playbook for Windows environments. It contains explicit instructions to extract SAM/SYSTEM hives (including via shadow copies), abuse HiveNightmare, use mimikatz/pwdump/samdump2 to dump credentials, search registries and files for cleartext passwords, extract Wi‑Fi keys, and decode unattended deployment passwords. It should be treated as high-risk offensive guidance and not used in production systems except in controlled, authorized red-team or incident-response contexts. Block, remove, or audit any occurrences of this content in repositories and investigate any systems where these commands were run.

Confidence: 95%Severity: 95%
MalwareHIGH
sub-skills/example-1-service-binary-path-exploitation.md

This snippet is a clear, high-risk exploitation recipe: it modifies a writable Windows service’s binary path to run netcat as a reverse shell and starts the service to obtain a SYSTEM-level remote shell. It constitutes malicious behavior (remote code execution/backdoor) and should be blocked, investigated if observed, and remediated by fixing service DACLs and applying detection/containment controls.

Confidence: 75%Severity: 95%
Audit Metadata
Analyzed At
Mar 4, 2026, 02:11 PM
Package URL
pkg:socket/skills-sh/Dokhacgiakhoa%2Fantigravity-ide%2Fwindows-privilege-escalation%2F@0b366910fbeb50b159f7da65f04c37b5028b4d85