From communitytools
Tests system security with Active Directory attacks (Kerberoasting, DCSync), Linux/Windows privilege escalation (SUID, kernel exploits), and exploit development (buffer overflow, ROP). Useful for pentesting.
npx claudepluginhub transilienceai/communitytoolsThis skill uses the workspace's default tool permissions.
Test system-level security including Active Directory, privilege escalation, and exploit development.
Lists privilege escalation techniques from low-priv user to root/admin on Linux and Windows systems for pentesting post-exploitation.
Guides Linux privilege escalation for red teams: SUID binaries, sudo misconfigs, kernel exploits, cron jobs, capabilities. For authorized pentesting and auditing.
Redirects Active Directory attack queries to redteam skill via /redteam --focus=ad, prioritizing BloodHound analysis, Kerberoasting, AS-REP roasting, DCSync, PtH/PtT, delegation abuse, GPO/ACL exploitation, and domain compromise.
Share bugs, ideas, or general feedback.
Test system-level security including Active Directory, privilege escalation, and exploit development.
| Type | Key Vectors |
|---|---|
| Active Directory | Kerberoasting, AS-REP roasting, DCSync, PtH, Golden/RODC Ticket, RBCD, ACL abuse, KeyList, Shadow Credentials, ADCS (ESC1-9/16) |
| Privilege Escalation | SUID/sudo abuse, kernel exploits, service misconfig, token manipulation |
| Exploit Development | Buffer overflow, format string, ROP chains, shellcode, heap exploitation |
reference/system-exploitation.md - AD attacks, privilege escalation, exploit development techniquesreference/format-string-exploitation.md - Format string read/write primitives, architecture differences, mitigation bypassreference/heap-exploitation.md - Modern glibc heap techniques (tcache poison, unsorted bin leak, environ stack leak, ROP)