Low Level CO 🇨🇴 – Telegram
Low Level CO 🇨🇴
132 subscribers
209 photos
14 videos
7 files
625 links
Canal enfocado en la investigación de técnicas de seguridad ofensivas avanzadas.

Windows internals
Malware Development
Exploits & Reversing
Low level programming
kernel mode & user mode
Syscall & Hypercalls
Ring 0, 3, -1
Firmware
Download Telegram
Forwarded from ARVIN
Nation-State Actor’s Arsenal: An In-Depth Look at Lazarus’ ScoringMathTea
https://0x0d4y.blog/arsenal-analysis-of-a-nation-state-actor-an-in-depth-look-at-lazarus-scoringmathtea
https://github.com/abrewer251/CVE-2025-62215_Windows_Kernel_PE

CVE-2025-62215 Exploit PoC
@ZwLowLevel


cl.exe poc.cpp /Od /ZI /RTC1 /MDd /link /OUT:unicorn.exe

[*] Starting CVE-2025-62215 exploitation...
[*] Performing heap spray...
[+] Allocated 100 heap chunks
[*] Spawning 8 threads to trigger race condition...
[*] Waiting for race condition...
[+] SUCCESS: Privilege escalation detected!
[+] EXPLOITATION SUCCESSFUL!
[+] Privileges escalated to SYSTEM
👑 Lord Of The Ring0 - Part 5 | Saruman's Manipulation

Un artículo de hace aproximadamente dos años, pero que aún sigue siendo atractivo!

#irp #windows_kernel
#windows_internals #ring0

@ZwLowLevel
https://idov31.github.io/posts/lord-of-the-ring0-p5
Please open Telegram to view this post
VIEW IN TELEGRAM
Ghost is a process injection detection tool written in Rust.

#malware_analysis #process_injection

@ZwLowLevel
Forwarded from club1337
Telegram ✉️ @club1337
X (Twitter) 🕊 @club31337
Please open Telegram to view this post
VIEW IN TELEGRAM