npx claudepluginhub plurigrid/asi --plugin asiThis skill uses the workspace's default tool permissions.
> **Legal Notice:** This skill is for authorized security testing and educational purposes only. Unauthorized use against systems you do not own or have written permission to test is illegal and may violate computer fraud laws.
Guides Linux privilege escalation for red teams: SUID binaries, sudo misconfigs, kernel exploits, cron jobs, capabilities. For authorized pentesting and auditing.
Executes Linux privilege escalation assessments: enumerates kernel, users, services; exploits misconfigurations, SUID binaries, cron jobs for root shell access.
Automates LinPEAS for Linux privilege escalation enumeration, detecting SUID/SGID binaries, sudo misconfigs, credentials, container breakouts, and kernel exploits after initial access.
Share bugs, ideas, or general feedback.
Legal Notice: This skill is for authorized security testing and educational purposes only. Unauthorized use against systems you do not own or have written permission to test is illegal and may violate computer fraud laws.
Linux privilege escalation involves elevating from a low-privilege user account to root access on a compromised system. Red teams exploit misconfigurations, vulnerable services, kernel exploits, and weak permissions to achieve root. This skill covers both manual enumeration techniques and automated tools for identifying and exploiting privilege escalation vectors.
find / -perm -4000 -type f 2>/dev/nullsudo -l to list allowed commandsgetcap -r / 2>/dev/null to find binaries with capabilities| Tool | Purpose |
|---|---|
| LinPEAS | Automated privilege escalation enumeration |
| LinEnum | Linux enumeration script |
| linux-exploit-suggester | Kernel exploit matching |
| pspy | Process monitoring without root |
| GTFOBins | SUID/sudo binary exploitation reference |
| PEASS-ng | Privilege escalation awesome scripts suite |