CodeMachine - Windows Kernel Rootkit Techniques-unlocked.pdf
5.2 MB
CodeMachine - Windows Kernel Rootkit Techniques
Most operating systems support kernel-mode device drivers, which execute with the same privileges as the operating system itself. As such, many kernel
https://www.coursefather.com/2023/12/Windows-rootkits-kernel.html?m=1
Most operating systems support kernel-mode device drivers, which execute with the same privileges as the operating system itself. As such, many kernel
https://www.coursefather.com/2023/12/Windows-rootkits-kernel.html?m=1
🔥5🥰1
aflplusplus.pdf
3.8 MB
AFL
"Fuzz Everything, Everywhere, All at Once: Advanced QEMU-based fuzzing", 2023.
"Fuzz Everything, Everywhere, All at Once: Advanced QEMU-based fuzzing", 2023.
👍5🔥2❤1
👍7
keylogger in golang
https://github.com/cultofchaos/kek
https://github.com/cultofchaos/kek
👍6❤1
Understanding Processor Architectures: CISC vs RISC
https://pcsite.co.uk/understanding-processor-architectures-cisc-vs-risc/?feed_id=15806
https://pcsite.co.uk/understanding-processor-architectures-cisc-vs-risc/?feed_id=15806
🔥5
Source Byte pinned «Understanding Processor Architectures: CISC vs RISC https://pcsite.co.uk/understanding-processor-architectures-cisc-vs-risc/?feed_id=15806»
Understanding_a_Payloads_Life.pdf
4.7 MB
Understanding a Payload's Life
Agenda
1. Needing an Advanced Payload
2. About Terminology
3. Payload Generation
4. Payload Executables
5. Payload Staging
6. Reflective Loading
👍9
Simulate the behavior of AV/EDR for malware development training
https://github.com/Helixo32/CrimsonEDR
https://github.com/Helixo32/CrimsonEDR
❤5👍3
Windows admin to kernel
LPE from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.
https://hakaisecurity.io/cve-2024-21338-from-admin-to-kernel-through-token-manipulation-and-windows-kernel-exploitation/research-blog/
LPE from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.
https://hakaisecurity.io/cve-2024-21338-from-admin-to-kernel-through-token-manipulation-and-windows-kernel-exploitation/research-blog/
👍4🔥2🤡2
PuTTY vulnerability vuln-p521-bias
https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-p521-bias.html
https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-p521-bias.html
👍3🔥2