This repository features code written in Rust intended to exploit the SeDebugPrivilege privilege. With this privilege enabled, it is possible to perform a process injection attack on a target process that has administrator permissions.
First perform the compilation with the command:
cargo build --release
If you are using a different operating system, you can use rustup and add the windows architecture:
rustup target add x86_64-pc-windows-gnu
Then compile specifying the architecture:
cargo build --release --target x86_64-pc-windows-gnu
You can run with cargo run or the compiled binary directly:
cargo run -- <pid>
target/release/SeDebugAbuse_rs.exe <pid>