performing-privilege-escalation-assessment
mukul975/Anthropic-Cybersecurity-Skills
Runs post-compromise privilege escalation assessments on Linux and Windows hosts by enumerating misconfigurations, services, SUID binaries, kernel exploits, cron jobs, and credential stores to prove how initial low-privilege access turns into root/SYSTEM, useful for red teams validating controls.