#kernel_security resultados de búsqueda

#exploit #Kernel_Security Ksmbd Vulnerability Research Part 1 - CVE-2024-50283, CVE-2024-50285, CVE-2024-50286 - blog.doyensec.com/2025/01/07/ksm… Part 2 - Fuzzing Improvements and Vulnerability Discovery - blog.doyensec.com/2025/09/02/ksm… Part 3 - Exploiting CVE-2025-37947 -…


#exploit #Kernel_Security Ksmbd Vulnerability Research Part 1 - CVE-2024-50283, CVE-2024-50285, CVE-2024-50286 - blog.doyensec.com/2025/01/07/ksm… Part 2 - Fuzzing Improvements and Vulnerability Discovery - blog.doyensec.com/2025/09/02/ksm… Part 3 - Exploiting CVE-2025-37947 -…


#tools #Kernel_Security Linux Kernel Runtime Guard (LKRG), v.1.0. ]-> lkrg.org ]-> github.com/lkrg-org/lkrg // LKRG - kernel module that performs runtime integrity checking of the kernel and detection of security vulnerability exploits against the kernel,…


#Kernel_Security 1⃣. NT OS Kernel Information Disclosure Vulnerability (CVE-2025-53136, CVE-2024-43511) - crowdfense.com/nt-os-kernel-i… // A race condition in Windows' "NtQuerySystemInformation()" allows kernel address leaks and potential privilege escalation across recent versions…


#exploit #Kernel_Security Exploiting eneio64.sys Kernel Driver on Windows 11 by Turning Physical Memory R/W into Virtual Memory R/W xacone.github.io/eneio-driver.h… ]-> Exploit for eneio64.sys Kernel Driver // a walkthrough of designing a POC for exploiting CVE-2020-12446, a…


#Kernel_Security Linux Kernel netfilter: ipset: Missing Range Check LPE ssd-disclosure.com/linux-kernel-n… // A vulnerability in Linux kernel's ipset allows out-of-bounds memory writes via crafted IP ranges, enabling privilege escalation and requiring immediate kernel updates


#Events #Research #Kernel_Security 34th USENIX Security Symposium: "System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System", 2025. ]-> Artifacts - zenodo.org/records/151464… // ..While all of our techniques present new avenues for…


#exploit #Kernel_Security CVE-2025-38236: From Chrome renderer code exec to kernel with MSG_OOB googleprojectzero.blogspot.com/2025/08/from-c… ]-> PoC code - project-zero.issues.chromium.org/issues/4230239… // Chrome's Linux desktop renderer sandbox exposes kernel attack surface that is never legitimately used in the sandbox


#Kernel_Security #Hardware_Security "Heracles: Chosen Plaintext Attack on AMD SEV-SNP", 2025. ]-> github.com/heracles-attack // In our case studies, we leak kernel memory, crypto keys, and user passwords, as well as demonstrate web session hijacking


#Kernel_Security DEF CON 33: "Infecting the Boot to Own the Kernel: Bootkits and Rootkits Development". ]-> UEFI Bootkit - github.com/TheMalwareGuar… ]-> Kernel-Mode Rootkit - github.com/TheMalwareGuar… ]-> Every resource you need to develop Bootkits/Rootkits - github.com/TheMalwareGuar…


#reversing #Kernel_Security Debugging the Pixel 8 kernel via KGDB xairy.io/articles/pixel… // The instructions cover building and flashing a custom Pixel 8 kernel to enable KGDB, breaking into KGDB either via ADB by relying on /proc/sysrq-trigger or purely over a serial…


#Events #Fuzzing #Kernel_Security "Bypassing Kernel Barriers: Fuzzing Linux Kernel in Userspace with Linux Kernel Library", LSSNA 2025. ]-> A collection of user-space Linux kernel specific guided fuzzers based on LKL - github.com/atrosinenko/kb… ]-> Linux Security Summit North…

github.com

GitHub - atrosinenko/kbdysch: A collection of user-space Linux kernel specific guided fuzzers based...

A collection of user-space Linux kernel specific guided fuzzers based on LKL - atrosinenko/kbdysch


#exploit #Kernel_Security 1. CVE-2025-22056: The tragedy of Netfilter Tunnel - dawnslab.jd.com/CVE-2025-22056 2. CVE-2023-52922: UaF in CAN BCM subsystem leading to information disclosure - allelesecurity.com/use-after-free… 3. CVE-2025-22037: Remote NULL Deref in Linux KSMBD -…


#tools #Research #Kernel_Security "Statically Discover Cross-Entry Use-After-Free Vulnerabilities in the Linux Kernel", 2025. ]-> Static Cross-Entry UAF Detector - github.com/uafx/uafx


#Kernel_Security Linux Kernel Exploitation Part 1 - Cross-Cache Attack - r1ru.github.io/posts/1/ Part 2 - Dirty PageTable - r1ru.github.io/posts/2/ Part 3 - DirtyCred - r1ru.github.io/posts/3/ Part 4 - Dirty Pipe - r1ru.github.io/posts/4/ Part 5 - USMA (User Space Mapping Attack)…


#reversing #Kernel_Security Using LLMs for tracing, kernel execution information gathering, debugging and reverse engineering of hypervisor technology Part 1: Using ChatGPT on Windows Secure Kernel with Intel Processor Trace - asset-intertech.com/resources/blog… Part 2: Using ChatGPT on…


#reversing #Kernel_Security Hypervisors for Memory Introspection and Reverse Engineering on Windows secret.club/2025/06/02/hyp… ]-> Windows UEFI Blue Pill Type-1 Hypervisor - github.com/memN0ps/illusi… ]-> Windows Kernel Blue Pill Type-2 Hypervisor - github.com/memN0ps/matrix…


#exploit #Kernel_Security "Analyzing the Windows 11 24H2 kernel shadow stack mitigation", SSTIC 2025. ]-> github.com/synacktiv/wind… // Windows kernel shadow stack mitigation uses Intel CET to prevent control-flow hijacking by overwriting return addresses on the stack, with a PoC…


Guten Morgen. Ohne Vorankündigung #Win10 #Kernel_Security

ONE996's tweet image. Guten Morgen. Ohne Vorankündigung #Win10 #Kernel_Security

Loading...

Something went wrong.


Something went wrong.


United States Trends