#windowskernel search results

Are stack expansion and stack guard not present in the 64-bit version of Windows kernel? Stack Guard is not set in RtlCreateUserStack while creating the stack for a new thread #windowskernel #kernel

raashidbhatt's tweet image. Are stack expansion and stack guard not present in the 64-bit version of Windows kernel?

Stack Guard is not set in RtlCreateUserStack while creating  the stack for a new thread

#windowskernel #kernel

How to display the PML4E, PDPTE, PDE and PTE of the PTE itself in windbg / kd? stackoverflow.com/questions/6673… #windows #windowskernel #pagetables #windbg #kd

overflow_meme's tweet image. How to display the PML4E, PDPTE, PDE and PTE of the PTE itself in windbg / kd? stackoverflow.com/questions/6673… #windows #windowskernel #pagetables #windbg #kd

🚨 Blog 6 is out! Jay Pandya breaks down Out-Of-Bounds in Windows kernel drivers—how it works, how it breaks, and why it matters. Read it now via White Knight Labs: whiteknightlabs.com/2025/07/01/und… #Infosec #WindowsKernel #CyberSecurity #ExploitDev

WKL_cyber's tweet image. 🚨 Blog 6 is out!

Jay Pandya breaks down Out-Of-Bounds in Windows kernel drivers—how it works, how it breaks, and why it matters.

Read it now via White Knight Labs: whiteknightlabs.com/2025/07/01/und…

#Infosec #WindowsKernel #CyberSecurity #ExploitDev

Here is the training stats of our @nullcon Goa, 2020 training on "Windows Kernel Exploitation" 📊 You can check training stats in the gif below. 👇 Want to join our next training? #Cybersecurity #WindowsKernel #Cyberattack #Security #InfoSec #ITSecurity #InfoSecurity


Microsoft patched a high-severity Windows Kernel privilege escalation vulnerability in February, six months after being informed that the flaw was being exploited as a zero-day. #Microsoft #WindowsKernel #vulnerability #securitypatch #zeroday #cybersecurity #WindowsAppLocker

viehgroup's tweet image. Microsoft patched a high-severity Windows Kernel privilege escalation vulnerability in February, six months after being informed that the flaw was being exploited as a zero-day. 

#Microsoft #WindowsKernel #vulnerability #securitypatch #zeroday #cybersecurity #WindowsAppLocker

🚀Boost your skills to the kernel level! 🖥️Learn the basics of Windows & driver internals, different memory corruption classes & fuzzing of kernel-mode drivers by Ashfaq @HackSysTeam 🎟️Get your ticket➡️bit.ly/3NWsFCH #NullconGoa2022 #training #windowskernel #infosec

nullcon's tweet image. 🚀Boost your skills to the kernel level!

 🖥️Learn the basics of Windows & driver internals, different memory corruption classes & fuzzing of kernel-mode drivers by Ashfaq @HackSysTeam 

🎟️Get your ticket➡️bit.ly/3NWsFCH

#NullconGoa2022 #training #windowskernel #infosec

Liberan 71 parches de seguridad por recientes ataques a #MicrosoftOffice y #WindowsKernel. bit.ly/1OWoGEg

codigoverde's tweet image. Liberan 71 parches de seguridad por recientes ataques a #MicrosoftOffice y #WindowsKernel. bit.ly/1OWoGEg

Windows kernel pool spraying fun - Part 1 - Determine kernel object size bit.ly/2x4AORC #infosec #hacking #windowskernel #cyber

Hakin9's tweet image. Windows kernel pool spraying fun - Part 1 - Determine kernel object size bit.ly/2x4AORC #infosec #hacking #windowskernel #cyber

Google outed an active #Windowsbug before Microsoft could #fix it. #Windowskernel tnw.to/2ehXrYl

mochahost's tweet image. Google outed an active #Windowsbug before Microsoft could #fix it. #Windowskernel

tnw.to/2ehXrYl

The severity of the Elevation of Privilege - Windows Kernel (CVE-2024-30088) has increased. А repository with technical details on this vulnerability and PoC appeared on GitHub. #Microsoft #Windows #WindowsKernel #ZDI #NtQueryInformationToken ➡️ t.me/avleonovcom/13…

leonov_av's tweet image. The severity of the Elevation of Privilege - Windows Kernel (CVE-2024-30088) has increased. А repository with technical details on this vulnerability and PoC appeared on GitHub. 
#Microsoft #Windows #WindowsKernel #ZDI #NtQueryInformationToken
➡️ t.me/avleonovcom/13…

Windows 10 bug 0xD1 DRIVER_IRQL_NOT_LESS_OR_EQUAL caused by tunnel.sys dereferencing NULL during Teredo flow teardown. A race condition between tcpip!LruCleanupDpcRoutine and tcpip!UdpCloseEndpoint triggers the crash. #WindowsKernel #RaceCondition ift.tt/nglMaV3


csirt_it: #Microsoft: rilevato lo sfruttamento attivo in rete della CVE-2024-30088, relativo a #WindowsKernel ⚠️ Ove non provveduto, si raccomanda l’aggiornamento tempestivo del software interessato

Il #PatchTuesday di #Microsoft risolve 51 nuove vulnerabilità, di cui una di tipo 0-day Rischio: 🔴 Tra le tipologie: 🔸 Remote Code Execution 🔸 Denial of Service 🔸 Information Disclosure 🔗 csirt.gov.it/contenuti/aggi… 🔄 Aggiornamenti disponibili 🔄

csirt_it's tweet image. Il #PatchTuesday di #Microsoft risolve 51 nuove vulnerabilità, di cui una di tipo 0-day

Rischio: 🔴

Tra le tipologie:
🔸 Remote Code Execution
🔸 Denial of Service
🔸 Information Disclosure

🔗 csirt.gov.it/contenuti/aggi…

🔄  Aggiornamenti disponibili 🔄


Check Point Research found a Windows kernel bug in Rust-based win32kbase_rs.sys triggered by malformed EMF/EMF+ metafiles causing SYSTEM_SERVICE_EXCEPTION (BSOD). Fixed in OS Build 26100.4202 via KB5058499. #WindowsKernel #RustLang #USA ift.tt/urw7G0v


Microsoft's September 2025 Patch Tuesday fixes 86 CVEs, including 3 critical Windows kernel vulnerabilities with CVSS up to 8.8, plus issues in Edge, SQL Server, NTLM, SMB, and more. #WindowsKernel #PatchTuesday #USA ift.tt/nkh2OvA


Windows 10 bug 0xD1 DRIVER_IRQL_NOT_LESS_OR_EQUAL caused by tunnel.sys dereferencing NULL during Teredo flow teardown. A race condition between tcpip!LruCleanupDpcRoutine and tcpip!UdpCloseEndpoint triggers the crash. #WindowsKernel #RaceCondition ift.tt/nglMaV3


When writing Windows kernel drivers, remember: callbacks from ObRegisterCallbacks run in the user thread’s context, no extra kernel thread. So your sync must handle multiple threads hitting your callback at the same time. #kernel #windowskernel #driver #os #callback


Threat Actors are now weaponizing #WindowsKernel loaders for more stealthy and flexible attacks. By using signed kernel loaders TA has the ability to adjust their attacks on the fly, leaving minimal forensic traces making it harder to detect. Out of 600+ signed #maliciousdrivers

GroupIB_TI's tweet image. Threat Actors are now weaponizing #WindowsKernel loaders for more stealthy and flexible attacks. By using signed kernel loaders TA has the ability to adjust their attacks on the fly, leaving minimal forensic traces making it harder to detect. Out of 600+ signed #maliciousdrivers…
GroupIB_TI's tweet image. Threat Actors are now weaponizing #WindowsKernel loaders for more stealthy and flexible attacks. By using signed kernel loaders TA has the ability to adjust their attacks on the fly, leaving minimal forensic traces making it harder to detect. Out of 600+ signed #maliciousdrivers…

🚨 Blog 6 is out! Jay Pandya breaks down Out-Of-Bounds in Windows kernel drivers—how it works, how it breaks, and why it matters. Read it now via White Knight Labs: whiteknightlabs.com/2025/07/01/und… #Infosec #WindowsKernel #CyberSecurity #ExploitDev

WKL_cyber's tweet image. 🚨 Blog 6 is out!

Jay Pandya breaks down Out-Of-Bounds in Windows kernel drivers—how it works, how it breaks, and why it matters.

Read it now via White Knight Labs: whiteknightlabs.com/2025/07/01/und…

#Infosec #WindowsKernel #CyberSecurity #ExploitDev

Deep dive into how syscalls work in the Windows kernel, exploring structures, debugging, and reversing techniques. alice.climent-pommeret.red/posts/a-syscal… #WindowsKernel


🚨 New Writeup Alert! 🚨 "CVE-2025–21333 Windows heap-based buffer overflow analysis" by Alessandro Iandoli is now live on IW! Check it out here: infosecwriteups.com/d1b597ae4bae #kernelexploit #windowskernel #privilegeescalation #hyperv #windowssandbox


Join our free #webinar: 🎯 "Windows Kernel Exploitation for Red Team Operators" 👉 loom.ly/VTXooaA This talk will guide you step-by-step into the world of #WindowsKernel exploitation, offering insights and tools needed to adapt and excel in modern #RedTeam operations.

NVISOsecurity's tweet image. Join our free #webinar: 🎯 "Windows Kernel Exploitation for Red Team Operators" 👉 loom.ly/VTXooaA
This talk will guide you step-by-step into the world of #WindowsKernel exploitation, offering insights and tools needed to adapt and excel in modern #RedTeam operations.

[Cracking Windows Kernel with HEVD] Chapter 3: Can we rop our way into triggering our shellcode? #windowskernel #exploit #HEVD #ROPchain #privilegeescalation mdanilor.github.io/posts/hevd-3/


csirt_it: #Microsoft: rilevato lo sfruttamento attivo in rete della CVE-2024-30088, relativo a #WindowsKernel ⚠️ Ove non provveduto, si raccomanda l’aggiornamento tempestivo del software interessato

Il #PatchTuesday di #Microsoft risolve 51 nuove vulnerabilità, di cui una di tipo 0-day Rischio: 🔴 Tra le tipologie: 🔸 Remote Code Execution 🔸 Denial of Service 🔸 Information Disclosure 🔗 csirt.gov.it/contenuti/aggi… 🔄 Aggiornamenti disponibili 🔄

csirt_it's tweet image. Il #PatchTuesday di #Microsoft risolve 51 nuove vulnerabilità, di cui una di tipo 0-day

Rischio: 🔴

Tra le tipologie:
🔸 Remote Code Execution
🔸 Denial of Service
🔸 Information Disclosure

🔗 csirt.gov.it/contenuti/aggi…

🔄  Aggiornamenti disponibili 🔄


Are stack expansion and stack guard not present in the 64-bit version of Windows kernel? Stack Guard is not set in RtlCreateUserStack while creating the stack for a new thread #windowskernel #kernel

raashidbhatt's tweet image. Are stack expansion and stack guard not present in the 64-bit version of Windows kernel?

Stack Guard is not set in RtlCreateUserStack while creating  the stack for a new thread

#windowskernel #kernel

How to display the PML4E, PDPTE, PDE and PTE of the PTE itself in windbg / kd? stackoverflow.com/questions/6673… #windows #windowskernel #pagetables #windbg #kd

overflow_meme's tweet image. How to display the PML4E, PDPTE, PDE and PTE of the PTE itself in windbg / kd? stackoverflow.com/questions/6673… #windows #windowskernel #pagetables #windbg #kd

🚨 Blog 6 is out! Jay Pandya breaks down Out-Of-Bounds in Windows kernel drivers—how it works, how it breaks, and why it matters. Read it now via White Knight Labs: whiteknightlabs.com/2025/07/01/und… #Infosec #WindowsKernel #CyberSecurity #ExploitDev

WKL_cyber's tweet image. 🚨 Blog 6 is out!

Jay Pandya breaks down Out-Of-Bounds in Windows kernel drivers—how it works, how it breaks, and why it matters.

Read it now via White Knight Labs: whiteknightlabs.com/2025/07/01/und…

#Infosec #WindowsKernel #CyberSecurity #ExploitDev

Threat Actors are now weaponizing #WindowsKernel loaders for more stealthy and flexible attacks. By using signed kernel loaders TA has the ability to adjust their attacks on the fly, leaving minimal forensic traces making it harder to detect. Out of 600+ signed #maliciousdrivers

GroupIB_TI's tweet image. Threat Actors are now weaponizing #WindowsKernel loaders for more stealthy and flexible attacks. By using signed kernel loaders TA has the ability to adjust their attacks on the fly, leaving minimal forensic traces making it harder to detect. Out of 600+ signed #maliciousdrivers…
GroupIB_TI's tweet image. Threat Actors are now weaponizing #WindowsKernel loaders for more stealthy and flexible attacks. By using signed kernel loaders TA has the ability to adjust their attacks on the fly, leaving minimal forensic traces making it harder to detect. Out of 600+ signed #maliciousdrivers…

Microsoft patched a high-severity Windows Kernel privilege escalation vulnerability in February, six months after being informed that the flaw was being exploited as a zero-day. #Microsoft #WindowsKernel #vulnerability #securitypatch #zeroday #cybersecurity #WindowsAppLocker

viehgroup's tweet image. Microsoft patched a high-severity Windows Kernel privilege escalation vulnerability in February, six months after being informed that the flaw was being exploited as a zero-day. 

#Microsoft #WindowsKernel #vulnerability #securitypatch #zeroday #cybersecurity #WindowsAppLocker

Here is the training stats of our @nullcon Goa, 2020 training on "Windows Kernel Exploitation" 📊 You can check training stats in the gif below. 👇 Want to join our next training? #Cybersecurity #WindowsKernel #Cyberattack #Security #InfoSec #ITSecurity #InfoSecurity


🚀Boost your skills to the kernel level! 🖥️Learn the basics of Windows & driver internals, different memory corruption classes & fuzzing of kernel-mode drivers by Ashfaq @HackSysTeam 🎟️Get your ticket➡️bit.ly/3NWsFCH #NullconGoa2022 #training #windowskernel #infosec

nullcon's tweet image. 🚀Boost your skills to the kernel level!

 🖥️Learn the basics of Windows & driver internals, different memory corruption classes & fuzzing of kernel-mode drivers by Ashfaq @HackSysTeam 

🎟️Get your ticket➡️bit.ly/3NWsFCH

#NullconGoa2022 #training #windowskernel #infosec

Windows kernel pool spraying fun - Part 1 - Determine kernel object size bit.ly/2x4AORC #infosec #hacking #windowskernel #cyber

Hakin9's tweet image. Windows kernel pool spraying fun - Part 1 - Determine kernel object size bit.ly/2x4AORC #infosec #hacking #windowskernel #cyber

Liberan 71 parches de seguridad por recientes ataques a #MicrosoftOffice y #WindowsKernel. bit.ly/1OWoGEg

codigoverde's tweet image. Liberan 71 parches de seguridad por recientes ataques a #MicrosoftOffice y #WindowsKernel. bit.ly/1OWoGEg

The severity of the Elevation of Privilege - Windows Kernel (CVE-2024-30088) has increased. А repository with technical details on this vulnerability and PoC appeared on GitHub. #Microsoft #Windows #WindowsKernel #ZDI #NtQueryInformationToken ➡️ t.me/avleonovcom/13…

leonov_av's tweet image. The severity of the Elevation of Privilege - Windows Kernel (CVE-2024-30088) has increased. А repository with technical details on this vulnerability and PoC appeared on GitHub. 
#Microsoft #Windows #WindowsKernel #ZDI #NtQueryInformationToken
➡️ t.me/avleonovcom/13…

Google outed an active #Windowsbug before Microsoft could #fix it. #Windowskernel tnw.to/2ehXrYl

mochahost's tweet image. Google outed an active #Windowsbug before Microsoft could #fix it. #Windowskernel

tnw.to/2ehXrYl

Join our free #webinar: 🎯 "Windows Kernel Exploitation for Red Team Operators" 👉 loom.ly/VTXooaA This talk will guide you step-by-step into the world of #WindowsKernel exploitation, offering insights and tools needed to adapt and excel in modern #RedTeam operations.

NVISOsecurity's tweet image. Join our free #webinar: 🎯 "Windows Kernel Exploitation for Red Team Operators" 👉 loom.ly/VTXooaA
This talk will guide you step-by-step into the world of #WindowsKernel exploitation, offering insights and tools needed to adapt and excel in modern #RedTeam operations.

Loading...

Something went wrong.


Something went wrong.


United States Trends