0e82ced082
This commit includes: * RDI binary that abuses the SMEP bypass and userland function pointer invocation that is provided by the driver. * Related metasploit module. * Associated make.build to build from command line. * Updated command line build file. This also includes the beginnings of a new set of functions that help with the management/automation of kernel-related work on Windows for local priv esc exploits.
18 lines
593 B
XML
Executable File
18 lines
593 B
XML
Executable File
<?xml version="1.0" standalone="yes"?>
|
|
<Project xmlns="http://schemas.microsoft.com/developer/msbuild/2003">
|
|
<PropertyGroup>
|
|
<SolutionPath>.\capcom_sys_exec.sln</SolutionPath>
|
|
</PropertyGroup>
|
|
|
|
<Target Name="all" DependsOnTargets="x86" />
|
|
|
|
<Target Name="x86">
|
|
<Message Text="x86 is not supported for capcom_sys_exec" />
|
|
</Target>
|
|
|
|
<Target Name="x64">
|
|
<Message Text="Building capcom_sys_exec x64 Release version" />
|
|
<MSBuild Projects="$(SolutionPath)" Properties="Configuration=Release;Platform=x64" Targets="Clean;Rebuild"/>
|
|
</Target>
|
|
</Project>
|