#windowskernel search results
Delivering a Deferred Procedure Call (DPC). #KernelDebugging #WindowsKernel #WindowsInternals #WinDBG #DebugModeOn
Tonight’s workplace @windowsdev #WindowsKernel #WDF #NetAdapterCx #WinsockKernel #openvpn #ovpndco #ovpndcowin
Are stack expansion and stack guard not present in the 64-bit version of Windows kernel? Stack Guard is not set in RtlCreateUserStack while creating the stack for a new thread #windowskernel #kernel
Signing a kenel driver that is built with MinGW, gcc stackoverflow.com/questions/6553… #mingw #gcc #windowskernel
How to display the PML4E, PDPTE, PDE and PTE of the PTE itself in windbg / kd? stackoverflow.com/questions/6673… #windows #windowskernel #pagetables #windbg #kd
🚨 Blog 6 is out! Jay Pandya breaks down Out-Of-Bounds in Windows kernel drivers—how it works, how it breaks, and why it matters. Read it now via White Knight Labs: whiteknightlabs.com/2025/07/01/und… #Infosec #WindowsKernel #CyberSecurity #ExploitDev
Here is the training stats of our @nullcon Goa, 2020 training on "Windows Kernel Exploitation" 📊 You can check training stats in the gif below. 👇 Want to join our next training? #Cybersecurity #WindowsKernel #Cyberattack #Security #InfoSec #ITSecurity #InfoSecurity
Exploring #WindowsKernel with #Fibratus and #Logsene #devops #devopsnews #guestpost by @rabbitstack bit.ly/2gERrr5
Microsoft patched a high-severity Windows Kernel privilege escalation vulnerability in February, six months after being informed that the flaw was being exploited as a zero-day. #Microsoft #WindowsKernel #vulnerability #securitypatch #zeroday #cybersecurity #WindowsAppLocker
🚀Boost your skills to the kernel level! 🖥️Learn the basics of Windows & driver internals, different memory corruption classes & fuzzing of kernel-mode drivers by Ashfaq @HackSysTeam 🎟️Get your ticket➡️bit.ly/3NWsFCH #NullconGoa2022 #training #windowskernel #infosec
#Vulnerabilities: #WindowsKernel cng.sys Pool-Based Buffer Overflow In #IOCTL 0x390400 - bit.ly/2GkXgwj-Ttx #ProjectZero @google 𝞝 #Enterprises #Organizations #SecurityFlaws #InfoSec #PrivilegeEscalation #CyberSecurity #DoS #PrivilegeEscalation #Cryptography #Exploitation
Liberan 71 parches de seguridad por recientes ataques a #MicrosoftOffice y #WindowsKernel. bit.ly/1OWoGEg
Windows kernel pool spraying fun - Part 1 - Determine kernel object size bit.ly/2x4AORC #infosec #hacking #windowskernel #cyber
The severity of the Elevation of Privilege - Windows Kernel (CVE-2024-30088) has increased. А repository with technical details on this vulnerability and PoC appeared on GitHub. #Microsoft #Windows #WindowsKernel #ZDI #NtQueryInformationToken ➡️ t.me/avleonovcom/13…
Windows 10 bug 0xD1 DRIVER_IRQL_NOT_LESS_OR_EQUAL caused by tunnel.sys dereferencing NULL during Teredo flow teardown. A race condition between tcpip!LruCleanupDpcRoutine and tcpip!UdpCloseEndpoint triggers the crash. #WindowsKernel #RaceCondition ift.tt/nglMaV3
csirt_it: #Microsoft: rilevato lo sfruttamento attivo in rete della CVE-2024-30088, relativo a #WindowsKernel ⚠️ Ove non provveduto, si raccomanda l’aggiornamento tempestivo del software interessato
Il #PatchTuesday di #Microsoft risolve 51 nuove vulnerabilità, di cui una di tipo 0-day Rischio: 🔴 Tra le tipologie: 🔸 Remote Code Execution 🔸 Denial of Service 🔸 Information Disclosure 🔗 csirt.gov.it/contenuti/aggi… 🔄 Aggiornamenti disponibili 🔄
Check Point Research found a Windows kernel bug in Rust-based win32kbase_rs.sys triggered by malformed EMF/EMF+ metafiles causing SYSTEM_SERVICE_EXCEPTION (BSOD). Fixed in OS Build 26100.4202 via KB5058499. #WindowsKernel #RustLang #USA ift.tt/urw7G0v
Microsoft's September 2025 Patch Tuesday fixes 86 CVEs, including 3 critical Windows kernel vulnerabilities with CVSS up to 8.8, plus issues in Edge, SQL Server, NTLM, SMB, and more. #WindowsKernel #PatchTuesday #USA ift.tt/nkh2OvA
Microsoft patched 86 vulnerabilities in September 2025 across Windows, SharePoint, Office, and SQL Server. None exploited yet, but 8 rated highly likely for exploitation, including critical remote code execution flaws. #WindowsKernel #SharePointFlaws ift.tt/M0wroST
hendryadrian.com
Microsoft Patches 86 Vulnerabilities
Microsoft's September 2025 Patch Tuesday fixed 86 vulnerabilities across Windows and other products, with none exploited in the wild but several rated highly likely for exploitation. Key patches...
Windows 10 bug 0xD1 DRIVER_IRQL_NOT_LESS_OR_EQUAL caused by tunnel.sys dereferencing NULL during Teredo flow teardown. A race condition between tcpip!LruCleanupDpcRoutine and tcpip!UdpCloseEndpoint triggers the crash. #WindowsKernel #RaceCondition ift.tt/nglMaV3
When writing Windows kernel drivers, remember: callbacks from ObRegisterCallbacks run in the user thread’s context, no extra kernel thread. So your sync must handle multiple threads hitting your callback at the same time. #kernel #windowskernel #driver #os #callback
Threat Actors are now weaponizing #WindowsKernel loaders for more stealthy and flexible attacks. By using signed kernel loaders TA has the ability to adjust their attacks on the fly, leaving minimal forensic traces making it harder to detect. Out of 600+ signed #maliciousdrivers…
🚨 Blog 6 is out! Jay Pandya breaks down Out-Of-Bounds in Windows kernel drivers—how it works, how it breaks, and why it matters. Read it now via White Knight Labs: whiteknightlabs.com/2025/07/01/und… #Infosec #WindowsKernel #CyberSecurity #ExploitDev
Over 20 vulnerabilities in Windows Kernel Streaming (KS) revealed, mainly affecting frame buffer handling & MDL misuse, risking memory corruption & privilege escalation. Stay alert to these critical flaws! 🛡️ #WindowsKernel #BufferFlaws #US ift.tt/j3dimq6
hendryadrian.com
Frame by Frame, Kernel Streaming Keeps Giving Vulnerabilities DEVCORE
This article explores multiple vulnerabilities discovered in the Windows Kernel Streaming (KS) framework, focusing on frame-related buffer handling and Memory Descriptor List (MDL) misuse. It reveals...
Deep dive into how syscalls work in the Windows kernel, exploring structures, debugging, and reversing techniques. alice.climent-pommeret.red/posts/a-syscal… #WindowsKernel
🚨 New Writeup Alert! 🚨 "CVE-2025–21333 Windows heap-based buffer overflow analysis" by Alessandro Iandoli is now live on IW! Check it out here: infosecwriteups.com/d1b597ae4bae #kernelexploit #windowskernel #privilegeescalation #hyperv #windowssandbox
0x06 - Approaching Modern Windows Kernel Type Confusions #WindowsKernel #TypeConfusions #Exploitation #VirtualMemory #PagedMemory wetw0rk.github.io/posts/0x06-app…
0x04 - Introduction to Windows Kernel Write What Where Vulnerabilities #WindowsKernel #WriteWhatWhere #Exploitation #Vulnerability #ArbitraryWrite wetw0rk.github.io/posts/0x04-wri…
0x08 - Modern Windows Kernel Race Conditions #WindowsKernel #RaceConditions #Exploitation #BufferOverflow #CodeExecution wetw0rk.github.io/posts/0x08-mod…
0x07 - Introduction to Windows Kernel Race Conditions #WindowsKernel #RaceCondition #VulnerabilityType #Exploitation #DoubleFetch wetw0rk.github.io/posts/0x07-int…
Join our free #webinar: 🎯 "Windows Kernel Exploitation for Red Team Operators" 👉 loom.ly/VTXooaA This talk will guide you step-by-step into the world of #WindowsKernel exploitation, offering insights and tools needed to adapt and excel in modern #RedTeam operations.
[Cracking Windows Kernel with HEVD] Chapter 3: Can we rop our way into triggering our shellcode? #windowskernel #exploit #HEVD #ROPchain #privilegeescalation mdanilor.github.io/posts/hevd-3/
This #WindowsKernel vulnerability is being exploited to escalate privileges and steal data. Check out the #CybersecurityThreatAdvisory for steps to protect your environment now: bit.ly/3Yki3Ej #CybersecurityThreatAdvisory
This #WindowsKernel vulnerability is being exploited to escalate privileges and steal data. Check out the #CybersecurityThreatAdvisory for steps to protect your environment now: bit.ly/3Yki3Ej #CybersecurityThreatAdvisory
csirt_it: #Microsoft: rilevato lo sfruttamento attivo in rete della CVE-2024-30088, relativo a #WindowsKernel ⚠️ Ove non provveduto, si raccomanda l’aggiornamento tempestivo del software interessato
Il #PatchTuesday di #Microsoft risolve 51 nuove vulnerabilità, di cui una di tipo 0-day Rischio: 🔴 Tra le tipologie: 🔸 Remote Code Execution 🔸 Denial of Service 🔸 Information Disclosure 🔗 csirt.gov.it/contenuti/aggi… 🔄 Aggiornamenti disponibili 🔄
Delivering a Deferred Procedure Call (DPC). #KernelDebugging #WindowsKernel #WindowsInternals #WinDBG #DebugModeOn
Tonight’s workplace @windowsdev #WindowsKernel #WDF #NetAdapterCx #WinsockKernel #openvpn #ovpndco #ovpndcowin
Are stack expansion and stack guard not present in the 64-bit version of Windows kernel? Stack Guard is not set in RtlCreateUserStack while creating the stack for a new thread #windowskernel #kernel
Signing a kenel driver that is built with MinGW, gcc stackoverflow.com/questions/6553… #mingw #gcc #windowskernel
How to display the PML4E, PDPTE, PDE and PTE of the PTE itself in windbg / kd? stackoverflow.com/questions/6673… #windows #windowskernel #pagetables #windbg #kd
🚨 Blog 6 is out! Jay Pandya breaks down Out-Of-Bounds in Windows kernel drivers—how it works, how it breaks, and why it matters. Read it now via White Knight Labs: whiteknightlabs.com/2025/07/01/und… #Infosec #WindowsKernel #CyberSecurity #ExploitDev
Exploring #WindowsKernel with #Fibratus and #Logsene #devops #devopsnews #guestpost by @rabbitstack bit.ly/2gERrr5
Threat Actors are now weaponizing #WindowsKernel loaders for more stealthy and flexible attacks. By using signed kernel loaders TA has the ability to adjust their attacks on the fly, leaving minimal forensic traces making it harder to detect. Out of 600+ signed #maliciousdrivers…
Microsoft patched a high-severity Windows Kernel privilege escalation vulnerability in February, six months after being informed that the flaw was being exploited as a zero-day. #Microsoft #WindowsKernel #vulnerability #securitypatch #zeroday #cybersecurity #WindowsAppLocker
Here is the training stats of our @nullcon Goa, 2020 training on "Windows Kernel Exploitation" 📊 You can check training stats in the gif below. 👇 Want to join our next training? #Cybersecurity #WindowsKernel #Cyberattack #Security #InfoSec #ITSecurity #InfoSecurity
🚀Boost your skills to the kernel level! 🖥️Learn the basics of Windows & driver internals, different memory corruption classes & fuzzing of kernel-mode drivers by Ashfaq @HackSysTeam 🎟️Get your ticket➡️bit.ly/3NWsFCH #NullconGoa2022 #training #windowskernel #infosec
#Vulnerabilities: #WindowsKernel cng.sys Pool-Based Buffer Overflow In #IOCTL 0x390400 - bit.ly/2GkXgwj-Ttx #ProjectZero @google 𝞝 #Enterprises #Organizations #SecurityFlaws #InfoSec #PrivilegeEscalation #CyberSecurity #DoS #PrivilegeEscalation #Cryptography #Exploitation
Windows kernel pool spraying fun - Part 1 - Determine kernel object size bit.ly/2x4AORC #infosec #hacking #windowskernel #cyber
Liberan 71 parches de seguridad por recientes ataques a #MicrosoftOffice y #WindowsKernel. bit.ly/1OWoGEg
The severity of the Elevation of Privilege - Windows Kernel (CVE-2024-30088) has increased. А repository with technical details on this vulnerability and PoC appeared on GitHub. #Microsoft #Windows #WindowsKernel #ZDI #NtQueryInformationToken ➡️ t.me/avleonovcom/13…
Join our free #webinar: 🎯 "Windows Kernel Exploitation for Red Team Operators" 👉 loom.ly/VTXooaA This talk will guide you step-by-step into the world of #WindowsKernel exploitation, offering insights and tools needed to adapt and excel in modern #RedTeam operations.
Something went wrong.
Something went wrong.
United States Trends
- 1. Chargers 37.1K posts
- 2. Vikings 26K posts
- 3. #911onABC 11.2K posts
- 4. Herbert 9,975 posts
- 5. #Skol 3,256 posts
- 6. $UNI 1,990 posts
- 7. #TNFonPrime 1,539 posts
- 8. Oronde Gadsden 2,524 posts
- 9. Dallas Turner N/A
- 10. #BoltUp 2,186 posts
- 11. Logan Cooley N/A
- 12. Rempe 3,231 posts
- 13. Isaiah Rodgers N/A
- 14. Athena 10.6K posts
- 15. #RHOC N/A
- 16. Vidal 7,892 posts
- 17. Pacers 12.1K posts
- 18. Bannon 15.9K posts
- 19. Becton N/A
- 20. Justin Jefferson 2,212 posts