A security research tool written in Rust that spawns a process running under the TrustedInstaller security principal on Windows.
Warning: TrustedInstaller permissions will make your machine a brick if you use them incorrectly. This tool is intended for security researchers who understand what they are doing. You have been warned.
TrustedInstaller is a Windows service account (NT SERVICE\TrustedInstaller) that sits above SYSTEM and Administrator in the privilege hierarchy. It owns core Windows system files and components that even SYSTEM cannot modify by default. Understanding what TrustedInstaller can and cannot do — compared to SYSTEM or a local Administrator — is useful context for security researchers evaluating Windows privilege boundaries.
This tool provides a straightforward way to spawn a shell or process under TrustedInstaller in order to interactively explore those boundaries.
Everything this tool does is by design in Windows — no exploits, no privilege escalation vulnerabilities, no policy bypasses.
-
Requires Administrator. The tool does not attempt to self-elevate. You must run it from an elevated context. This is an intentional prerequisite, not a shortcut.
-
Starts the TrustedInstaller service via the Service Control Manager using standard
OpenSCManager/OpenService/StartServiceWin32 APIs. -
Locates the TrustedInstaller process by walking the system process snapshot via
CreateToolhelp32Snapshot. -
Spawns a child process using
CreateProcesswithPROC_THREAD_ATTRIBUTE_PARENT_PROCESSset to the TrustedInstaller process handle. This is a documented Windows feature that designates a specific process as the parent, causing the child to inherit its token. The result is a new process running as TrustedInstaller.
The TrustedInstaller service shuts itself down automatically after a short idle period — no cleanup is required.
Requires Windows and Administrator privileges.
# Spawn PowerShell as TrustedInstaller (default)
become-ti.exe
# Spawn a specific process
become-ti.exe cmd.exe
Requires the Rust toolchain with the x86_64-pc-windows-gnu target and a MinGW-w64 compatible toolchain.
rustup target add x86_64-pc-windows-gnu
cargo build --release --target x86_64-pc-windows-gnu
Security researchers and Windows internals practitioners who want a hands-on way to observe TrustedInstaller's privilege boundary compared to SYSTEM and Administrator. This is not a general-purpose tool and is not intended for use in production environments.