Trusted
This skill provides documentation about Windows privilege escalation techniques, including system enumeration, credential harvesting, and service exploitation.
version 15f01cf35edb
2 findings
static analysis only
requires secrets
no human review yet
Safety
94
Quality
94
Transparency
100
Operational
92