Part 1 | Introduction
Part 2 | A tale of routines, IOCTLs and IRPs
Part 3 | Sailing to the land of the user (and debugging the ship)
Part 4 | The call back home
Part 5 | Saruman's Manipulation
https://github.com/Idov31/Nidhogg
https://github.com/daem0nc0re/VectorKernel
https://github.com/floesen/KExecDD
https://tierzerosecurity.co.nz/2024/04/29/kexecdd.html
https://github.com/lem0nSec/KBlast
Last updated 19 days ago