lockpick

Installation
SKILL.md

Lockpick: Privilege Escalation & Post-Exploitation Assessment

Systematic privilege escalation methodology for authorized security assessments, CTF challenges, and penetration testing engagements. Covers Linux systems, containers, Kubernetes clusters, VPN infrastructure, and IaC credential exposure.

This skill is offensive - it assumes you have initial access and guides escalation to higher privileges. For defensive hardening and vulnerability scanning, use the security-audit skill instead.

When to use

  • Authorized penetration testing engagements (with written scope)
  • CTF challenges and security training labs (HTB, THM, PG, etc.)
  • Post-exploitation enumeration after gaining initial shell access
  • Red team exercises with defined rules of engagement
  • Assessing your own infrastructure for privilege escalation paths
  • Container escape and Kubernetes RBAC abuse testing
  • VPN credential extraction and lateral movement assessment
Related skills
Installs
11
GitHub Stars
6
First Seen
Apr 1, 2026