Core capabilities
| Feature | Description |
|---|---|
| Token Impersonation | Duplicate and leverage tokens from privileged processes |
| Native Enumeration | Zero external dependencies for process listing |
| Auto-Escalation | Direct flow to elevate context when viable |
| Flexible Targeting | Target by PID, process name, or automatic discovery |
| Quiet Mode | Silent operation for scripting and automation |
Notes
- The design prioritizes low footprint and controlled execution.
- Native enumeration helps reduce external noise and dependencies.