#kernelexploit نتائج البحث

Finally got my first flag for the @1ns0mn1h4ck ! It only took me 18,5 sleepless hours #ctf #kernelexploit #etason #notsonenough #ineedsleep

tihmstar's tweet image. Finally got my first flag for the @1ns0mn1h4ck !
It only took me 18,5 sleepless hours #ctf #kernelexploit #etason #notsonenough #ineedsleep

Time for some Pwnage. This year we have prepared a few challenges where you'll have to write exploits for a custom kernel, built from scratch. #xmas2019 #pwn #kernelexploit


A PoC exploit for CVE-2020-12446 in eneio64.sys (Trident Z Lighting Control v1.00.08) maps physical memory to user space on Windows 11 with HVCI enabled, enabling SYSTEM token theft and SYSTEM shell spawn. #Windows11 #KernelExploit #USA ift.tt/FCU4OAd


Feo está usar juegos sin licencia, pero más feo está tener un emulador de PS2 en el sistema y hacer pasar por caja a los usuarios #ps4 #505kx #kernelexploit #scene

majorneslon's tweet image. Feo está usar juegos sin licencia, pero más feo está tener un emulador de PS2 en el sistema y hacer pasar por caja a los usuarios #ps4 #505kx #kernelexploit #scene

Linux Kernel hit as PoC exploit for critical nftables flaw CVE-2024-26809 opens door to full root access via double-free attack. #LinuxSecurity #CVE202426809 #KernelExploit

CyberSecTV_eu's tweet image. Linux Kernel hit as PoC exploit for critical nftables flaw CVE-2024-26809 opens door to full root access via double-free attack.  
#LinuxSecurity #CVE202426809 #KernelExploit

Restricted shell ≠ secure system. We found a diagnostic tool in router firmware that allowed direct kernel memory access—bypassing all shell constraints. Kernel-level exploitation starts here. versprite.com/blog/the-shell… #CyberSecurity #FirmwareHacking #KernelExploit


A critical UAF flaw in the Linux Traffic Control subsystem allows local privilege escalation to root. A fully detailed PoC exploit has been released. #LinuxKernel #UAF #KernelExploit #Root #CVE securityonline.info/poc-released-f…


If you broke through but only got a low-level shell, you can use privilege escalation to gain access to more power accounts and own the system. bit.ly/2vEwJkc #Linux #KernelExploit

NullByte's tweet image. If you broke through but only got a low-level shell, you can use privilege escalation to gain access to more power accounts and own the system. bit.ly/2vEwJkc #Linux #KernelExploit

Caught in a Cloud Conundrum! ☁️ 🏴‍☠️ A Use-after-free vulnerability in Azure Cloud Shell could let attackers level up their access, break free from containers, and raid your cloud resources. Know More: nullcon.net/goa-2025/speak… #kernelexploit #cloudsecurity #Azure #NullconGoa2025

nullcon's tweet image. Caught in a Cloud Conundrum! ☁️

🏴‍☠️ A Use-after-free vulnerability in Azure Cloud Shell could let attackers level up their access, break free from containers, and raid your cloud resources.

Know More: nullcon.net/goa-2025/speak…

#kernelexploit #cloudsecurity #Azure #NullconGoa2025

4/11 Bootkitty manipulates GRUB and the Linux kernel to inject harmful code, highlighting the need for vigilance. #KernelExploit #GRUBManipulation 🔧


📌 Summary iOS Privilege Escalation breaks Apple’s sandbox and kernel protections. From Pegasus spyware to Checkm8 and jailbreaks, PrivEsc is at the heart of every major iOS exploit. #iOS #PrivilegeEscalation #KernelExploit #iOSJailbreak #BugBounty #CyberSecurity #EthicalHacking


📌 Summary iOS Privilege Escalation breaks Apple’s sandbox and kernel protections. From Pegasus spyware to Checkm8 and jailbreaks, PrivEsc is at the heart of every major iOS exploit. #iOS #PrivilegeEscalation #KernelExploit #iOSJailbreak #BugBounty #CyberSecurity #EthicalHacking


Restricted shell ≠ secure system. We found a diagnostic tool in router firmware that allowed direct kernel memory access—bypassing all shell constraints. Kernel-level exploitation starts here. versprite.com/blog/the-shell… #CyberSecurity #FirmwareHacking #KernelExploit


A PoC exploit for CVE-2020-12446 in eneio64.sys (Trident Z Lighting Control v1.00.08) maps physical memory to user space on Windows 11 with HVCI enabled, enabling SYSTEM token theft and SYSTEM shell spawn. #Windows11 #KernelExploit #USA ift.tt/FCU4OAd


Linux Kernel hit as PoC exploit for critical nftables flaw CVE-2024-26809 opens door to full root access via double-free attack. #LinuxSecurity #CVE202426809 #KernelExploit

CyberSecTV_eu's tweet image. Linux Kernel hit as PoC exploit for critical nftables flaw CVE-2024-26809 opens door to full root access via double-free attack.  
#LinuxSecurity #CVE202426809 #KernelExploit

🚨 New Writeup Alert! 🚨 "CVE-2025–21333 Windows heap-based buffer overflow analysis" by Alessandro Iandoli is now live on IW! Check it out here: infosecwriteups.com/d1b597ae4bae #kernelexploit #windowskernel #privilegeescalation #hyperv #windowssandbox


Caught in a Cloud Conundrum! ☁️ 🏴‍☠️ A Use-after-free vulnerability in Azure Cloud Shell could let attackers level up their access, break free from containers, and raid your cloud resources. Know More: nullcon.net/goa-2025/speak… #kernelexploit #cloudsecurity #Azure #NullconGoa2025

nullcon's tweet image. Caught in a Cloud Conundrum! ☁️

🏴‍☠️ A Use-after-free vulnerability in Azure Cloud Shell could let attackers level up their access, break free from containers, and raid your cloud resources.

Know More: nullcon.net/goa-2025/speak…

#kernelexploit #cloudsecurity #Azure #NullconGoa2025

4/11 Bootkitty manipulates GRUB and the Linux kernel to inject harmful code, highlighting the need for vigilance. #KernelExploit #GRUBManipulation 🔧


[Cracking Windows Kernel with HEVD] Chapter 4: How do we write a shellcode to elevate privileges and gracefully return to userland? #PrivilegeElevation #KernelExploit #WindowsSecurity #AssemblyProgramming #Shellcode mdanilor.github.io/posts/hevd-4/


Finally got my first flag for the @1ns0mn1h4ck ! It only took me 18,5 sleepless hours #ctf #kernelexploit #etason #notsonenough #ineedsleep

tihmstar's tweet image. Finally got my first flag for the @1ns0mn1h4ck !
It only took me 18,5 sleepless hours #ctf #kernelexploit #etason #notsonenough #ineedsleep

Caught in a Cloud Conundrum! ☁️ 🏴‍☠️ A Use-after-free vulnerability in Azure Cloud Shell could let attackers level up their access, break free from containers, and raid your cloud resources. Know More: nullcon.net/goa-2025/speak… #kernelexploit #cloudsecurity #Azure #NullconGoa2025

nullcon's tweet image. Caught in a Cloud Conundrum! ☁️

🏴‍☠️ A Use-after-free vulnerability in Azure Cloud Shell could let attackers level up their access, break free from containers, and raid your cloud resources.

Know More: nullcon.net/goa-2025/speak…

#kernelexploit #cloudsecurity #Azure #NullconGoa2025

Linux Kernel hit as PoC exploit for critical nftables flaw CVE-2024-26809 opens door to full root access via double-free attack. #LinuxSecurity #CVE202426809 #KernelExploit

CyberSecTV_eu's tweet image. Linux Kernel hit as PoC exploit for critical nftables flaw CVE-2024-26809 opens door to full root access via double-free attack.  
#LinuxSecurity #CVE202426809 #KernelExploit

Feo está usar juegos sin licencia, pero más feo está tener un emulador de PS2 en el sistema y hacer pasar por caja a los usuarios #ps4 #505kx #kernelexploit #scene

majorneslon's tweet image. Feo está usar juegos sin licencia, pero más feo está tener un emulador de PS2 en el sistema y hacer pasar por caja a los usuarios #ps4 #505kx #kernelexploit #scene

If you broke through but only got a low-level shell, you can use privilege escalation to gain access to more power accounts and own the system. bit.ly/2vEwJkc #Linux #KernelExploit

NullByte's tweet image. If you broke through but only got a low-level shell, you can use privilege escalation to gain access to more power accounts and own the system. bit.ly/2vEwJkc #Linux #KernelExploit

RT WonderHowTo "RT NullByteWht: If you broke through but only got a low-level shell, you can use privilege escalation to gain access to more power accounts and own the system. bit.ly/2vEwJkc #Linux #KernelExploit https://t.co/GXwGBMERCV"

Dr2moke's tweet image. RT WonderHowTo "RT NullByteWht: If you broke through but only got a low-level shell, you can use privilege escalation to gain access to more power accounts and own the system. bit.ly/2vEwJkc #Linux #KernelExploit https://t.co/GXwGBMERCV"

Loading...

Something went wrong.


Something went wrong.


United States Trends