Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/rip1s/cve-2018-8120
CVE-2018-8120 Windows LPE exploit
https://github.com/rip1s/cve-2018-8120
cve cve-2018-8210 exploit
Last synced: 6 days ago
JSON representation
CVE-2018-8120 Windows LPE exploit
- Host: GitHub
- URL: https://github.com/rip1s/cve-2018-8120
- Owner: rip1s
- License: gpl-3.0
- Created: 2018-05-19T02:43:15.000Z (over 6 years ago)
- Default Branch: master
- Last Pushed: 2018-05-30T13:09:54.000Z (over 6 years ago)
- Last Synced: 2024-12-22T17:13:28.248Z (14 days ago)
- Topics: cve, cve-2018-8210, exploit
- Language: C++
- Size: 349 KB
- Stars: 494
- Watchers: 22
- Forks: 191
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# CVE-2018-8120
CVE-2018-8120 Windows LPE exploitSupports both x32 and x64.
Tested on: Win7 x32, Win7 x64, Win2008 x32, Win2008 R2 x32, Win2008 R2 Datacenter x64, Win2008 Enterprise x64.
![image](https://github.com/unamer/CVE-2018-8120/blob/master/screenshot.bmp)
## Usage
```shell
CVE-2018-8120 exploit by @unamer(https://github.com/unamer)
Usage: exp.exe command
Example: exp.exe "net user admin admin /ad"
```
## Caution
* Please exclude shellcode.asm if you wanna compile x32 version.## Reference
* https://xiaodaozhi.com/exploit/156.html
* https://github.com/bigric3/cve-2018-8120