#windowskernel 搜尋結果

Are stack expansion and stack guard not present in the 64-bit version of Windows kernel? Stack Guard is not set in RtlCreateUserStack while creating the stack for a new thread #windowskernel #kernel

raashidbhatt's tweet image. Are stack expansion and stack guard not present in the 64-bit version of Windows kernel?

Stack Guard is not set in RtlCreateUserStack while creating  the stack for a new thread

#windowskernel #kernel

How to display the PML4E, PDPTE, PDE and PTE of the PTE itself in windbg / kd? stackoverflow.com/questions/6673… #windows #windowskernel #pagetables #windbg #kd

overflow_meme's tweet image. How to display the PML4E, PDPTE, PDE and PTE of the PTE itself in windbg / kd? stackoverflow.com/questions/6673… #windows #windowskernel #pagetables #windbg #kd

Here is the training stats of our @nullcon Goa, 2020 training on "Windows Kernel Exploitation" 📊 You can check training stats in the gif below. 👇 Want to join our next training? #Cybersecurity #WindowsKernel #Cyberattack #Security #InfoSec #ITSecurity #InfoSecurity


🚨 Blog 6 is out! Jay Pandya breaks down Out-Of-Bounds in Windows kernel drivers—how it works, how it breaks, and why it matters. Read it now via White Knight Labs: whiteknightlabs.com/2025/07/01/und… #Infosec #WindowsKernel #CyberSecurity #ExploitDev

WKL_cyber's tweet image. 🚨 Blog 6 is out!

Jay Pandya breaks down Out-Of-Bounds in Windows kernel drivers—how it works, how it breaks, and why it matters.

Read it now via White Knight Labs: whiteknightlabs.com/2025/07/01/und…

#Infosec #WindowsKernel #CyberSecurity #ExploitDev

Microsoft patched a high-severity Windows Kernel privilege escalation vulnerability in February, six months after being informed that the flaw was being exploited as a zero-day. #Microsoft #WindowsKernel #vulnerability #securitypatch #zeroday #cybersecurity #WindowsAppLocker

viehgroup's tweet image. Microsoft patched a high-severity Windows Kernel privilege escalation vulnerability in February, six months after being informed that the flaw was being exploited as a zero-day. 

#Microsoft #WindowsKernel #vulnerability #securitypatch #zeroday #cybersecurity #WindowsAppLocker

🚀Boost your skills to the kernel level! 🖥️Learn the basics of Windows & driver internals, different memory corruption classes & fuzzing of kernel-mode drivers by Ashfaq @HackSysTeam 🎟️Get your ticket➡️bit.ly/3NWsFCH #NullconGoa2022 #training #windowskernel #infosec

nullcon's tweet image. 🚀Boost your skills to the kernel level!

 🖥️Learn the basics of Windows & driver internals, different memory corruption classes & fuzzing of kernel-mode drivers by Ashfaq @HackSysTeam 

🎟️Get your ticket➡️bit.ly/3NWsFCH

#NullconGoa2022 #training #windowskernel #infosec

Liberan 71 parches de seguridad por recientes ataques a #MicrosoftOffice y #WindowsKernel. bit.ly/1OWoGEg

codigoverde's tweet image. Liberan 71 parches de seguridad por recientes ataques a #MicrosoftOffice y #WindowsKernel. bit.ly/1OWoGEg

Windows kernel pool spraying fun - Part 1 - Determine kernel object size bit.ly/2x4AORC #infosec #hacking #windowskernel #cyber

Hakin9's tweet image. Windows kernel pool spraying fun - Part 1 - Determine kernel object size bit.ly/2x4AORC #infosec #hacking #windowskernel #cyber

Windows 10 bug 0xD1 DRIVER_IRQL_NOT_LESS_OR_EQUAL caused by tunnel.sys dereferencing NULL during Teredo flow teardown. A race condition between tcpip!LruCleanupDpcRoutine and tcpip!UdpCloseEndpoint triggers the crash. #WindowsKernel #RaceCondition ift.tt/nglMaV3


Google outed an active #Windowsbug before Microsoft could #fix it. #Windowskernel tnw.to/2ehXrYl

mochahost's tweet image. Google outed an active #Windowsbug before Microsoft could #fix it. #Windowskernel

tnw.to/2ehXrYl

csirt_it: #Microsoft: rilevato lo sfruttamento attivo in rete della CVE-2024-30088, relativo a #WindowsKernel ⚠️ Ove non provveduto, si raccomanda l’aggiornamento tempestivo del software interessato

Il #PatchTuesday di #Microsoft risolve 51 nuove vulnerabilità, di cui una di tipo 0-day Rischio: 🔴 Tra le tipologie: 🔸 Remote Code Execution 🔸 Denial of Service 🔸 Information Disclosure 🔗 csirt.gov.it/contenuti/aggi… 🔄 Aggiornamenti disponibili 🔄

csirt_it's tweet image. Il #PatchTuesday di #Microsoft risolve 51 nuove vulnerabilità, di cui una di tipo 0-day

Rischio: 🔴

Tra le tipologie:
🔸 Remote Code Execution
🔸 Denial of Service
🔸 Information Disclosure

🔗 csirt.gov.it/contenuti/aggi…

🔄  Aggiornamenti disponibili 🔄


Join our free #webinar: 🎯 "Windows Kernel Exploitation for Red Team Operators" 👉 loom.ly/VTXooaA This talk will guide you step-by-step into the world of #WindowsKernel exploitation, offering insights and tools needed to adapt and excel in modern #RedTeam operations.

NVISOsecurity's tweet image. Join our free #webinar: 🎯 "Windows Kernel Exploitation for Red Team Operators" 👉 loom.ly/VTXooaA
This talk will guide you step-by-step into the world of #WindowsKernel exploitation, offering insights and tools needed to adapt and excel in modern #RedTeam operations.

Check Point Research found a Windows kernel bug in Rust-based win32kbase_rs.sys triggered by malformed EMF/EMF+ metafiles causing SYSTEM_SERVICE_EXCEPTION (BSOD). Fixed in OS Build 26100.4202 via KB5058499. #WindowsKernel #RustLang #USA ift.tt/urw7G0v


Microsoft's September 2025 Patch Tuesday fixes 86 CVEs, including 3 critical Windows kernel vulnerabilities with CVSS up to 8.8, plus issues in Edge, SQL Server, NTLM, SMB, and more. #WindowsKernel #PatchTuesday #USA ift.tt/nkh2OvA


Microsoft patched 86 vulnerabilities in September 2025 across Windows, SharePoint, Office, and SQL Server. None exploited yet, but 8 rated highly likely for exploitation, including critical remote code execution flaws. #WindowsKernel #SharePointFlaws ift.tt/M0wroST


Windows 10 bug 0xD1 DRIVER_IRQL_NOT_LESS_OR_EQUAL caused by tunnel.sys dereferencing NULL during Teredo flow teardown. A race condition between tcpip!LruCleanupDpcRoutine and tcpip!UdpCloseEndpoint triggers the crash. #WindowsKernel #RaceCondition ift.tt/nglMaV3


Threat Actors are now weaponizing #WindowsKernel loaders for more stealthy and flexible attacks. By using signed kernel loaders TA has the ability to adjust their attacks on the fly, leaving minimal forensic traces making it harder to detect. Out of 600+ signed #maliciousdrivers

GroupIB_TI's tweet image. Threat Actors are now weaponizing #WindowsKernel loaders for more stealthy and flexible attacks. By using signed kernel loaders TA has the ability to adjust their attacks on the fly, leaving minimal forensic traces making it harder to detect. Out of 600+ signed #maliciousdrivers…
GroupIB_TI's tweet image. Threat Actors are now weaponizing #WindowsKernel loaders for more stealthy and flexible attacks. By using signed kernel loaders TA has the ability to adjust their attacks on the fly, leaving minimal forensic traces making it harder to detect. Out of 600+ signed #maliciousdrivers…

🚨 Blog 6 is out! Jay Pandya breaks down Out-Of-Bounds in Windows kernel drivers—how it works, how it breaks, and why it matters. Read it now via White Knight Labs: whiteknightlabs.com/2025/07/01/und… #Infosec #WindowsKernel #CyberSecurity #ExploitDev

WKL_cyber's tweet image. 🚨 Blog 6 is out!

Jay Pandya breaks down Out-Of-Bounds in Windows kernel drivers—how it works, how it breaks, and why it matters.

Read it now via White Knight Labs: whiteknightlabs.com/2025/07/01/und…

#Infosec #WindowsKernel #CyberSecurity #ExploitDev

Deep dive into how syscalls work in the Windows kernel, exploring structures, debugging, and reversing techniques. alice.climent-pommeret.red/posts/a-syscal… #WindowsKernel


🚨 New Writeup Alert! 🚨 "CVE-2025–21333 Windows heap-based buffer overflow analysis" by Alessandro Iandoli is now live on IW! Check it out here: infosecwriteups.com/d1b597ae4bae #kernelexploit #windowskernel #privilegeescalation #hyperv #windowssandbox


Join our free #webinar: 🎯 "Windows Kernel Exploitation for Red Team Operators" 👉 loom.ly/VTXooaA This talk will guide you step-by-step into the world of #WindowsKernel exploitation, offering insights and tools needed to adapt and excel in modern #RedTeam operations.

NVISOsecurity's tweet image. Join our free #webinar: 🎯 "Windows Kernel Exploitation for Red Team Operators" 👉 loom.ly/VTXooaA
This talk will guide you step-by-step into the world of #WindowsKernel exploitation, offering insights and tools needed to adapt and excel in modern #RedTeam operations.

[Cracking Windows Kernel with HEVD] Chapter 3: Can we rop our way into triggering our shellcode? #windowskernel #exploit #HEVD #ROPchain #privilegeescalation mdanilor.github.io/posts/hevd-3/


csirt_it: #Microsoft: rilevato lo sfruttamento attivo in rete della CVE-2024-30088, relativo a #WindowsKernel ⚠️ Ove non provveduto, si raccomanda l’aggiornamento tempestivo del software interessato

Il #PatchTuesday di #Microsoft risolve 51 nuove vulnerabilità, di cui una di tipo 0-day Rischio: 🔴 Tra le tipologie: 🔸 Remote Code Execution 🔸 Denial of Service 🔸 Information Disclosure 🔗 csirt.gov.it/contenuti/aggi… 🔄 Aggiornamenti disponibili 🔄

csirt_it's tweet image. Il #PatchTuesday di #Microsoft risolve 51 nuove vulnerabilità, di cui una di tipo 0-day

Rischio: 🔴

Tra le tipologie:
🔸 Remote Code Execution
🔸 Denial of Service
🔸 Information Disclosure

🔗 csirt.gov.it/contenuti/aggi…

🔄  Aggiornamenti disponibili 🔄


How to display the PML4E, PDPTE, PDE and PTE of the PTE itself in windbg / kd? stackoverflow.com/questions/6673… #windows #windowskernel #pagetables #windbg #kd

overflow_meme's tweet image. How to display the PML4E, PDPTE, PDE and PTE of the PTE itself in windbg / kd? stackoverflow.com/questions/6673… #windows #windowskernel #pagetables #windbg #kd

Are stack expansion and stack guard not present in the 64-bit version of Windows kernel? Stack Guard is not set in RtlCreateUserStack while creating the stack for a new thread #windowskernel #kernel

raashidbhatt's tweet image. Are stack expansion and stack guard not present in the 64-bit version of Windows kernel?

Stack Guard is not set in RtlCreateUserStack while creating  the stack for a new thread

#windowskernel #kernel

Threat Actors are now weaponizing #WindowsKernel loaders for more stealthy and flexible attacks. By using signed kernel loaders TA has the ability to adjust their attacks on the fly, leaving minimal forensic traces making it harder to detect. Out of 600+ signed #maliciousdrivers

GroupIB_TI's tweet image. Threat Actors are now weaponizing #WindowsKernel loaders for more stealthy and flexible attacks. By using signed kernel loaders TA has the ability to adjust their attacks on the fly, leaving minimal forensic traces making it harder to detect. Out of 600+ signed #maliciousdrivers…
GroupIB_TI's tweet image. Threat Actors are now weaponizing #WindowsKernel loaders for more stealthy and flexible attacks. By using signed kernel loaders TA has the ability to adjust their attacks on the fly, leaving minimal forensic traces making it harder to detect. Out of 600+ signed #maliciousdrivers…

Microsoft patched a high-severity Windows Kernel privilege escalation vulnerability in February, six months after being informed that the flaw was being exploited as a zero-day. #Microsoft #WindowsKernel #vulnerability #securitypatch #zeroday #cybersecurity #WindowsAppLocker

viehgroup's tweet image. Microsoft patched a high-severity Windows Kernel privilege escalation vulnerability in February, six months after being informed that the flaw was being exploited as a zero-day. 

#Microsoft #WindowsKernel #vulnerability #securitypatch #zeroday #cybersecurity #WindowsAppLocker

🚨 Blog 6 is out! Jay Pandya breaks down Out-Of-Bounds in Windows kernel drivers—how it works, how it breaks, and why it matters. Read it now via White Knight Labs: whiteknightlabs.com/2025/07/01/und… #Infosec #WindowsKernel #CyberSecurity #ExploitDev

WKL_cyber's tweet image. 🚨 Blog 6 is out!

Jay Pandya breaks down Out-Of-Bounds in Windows kernel drivers—how it works, how it breaks, and why it matters.

Read it now via White Knight Labs: whiteknightlabs.com/2025/07/01/und…

#Infosec #WindowsKernel #CyberSecurity #ExploitDev

Here is the training stats of our @nullcon Goa, 2020 training on "Windows Kernel Exploitation" 📊 You can check training stats in the gif below. 👇 Want to join our next training? #Cybersecurity #WindowsKernel #Cyberattack #Security #InfoSec #ITSecurity #InfoSecurity


🚀Boost your skills to the kernel level! 🖥️Learn the basics of Windows & driver internals, different memory corruption classes & fuzzing of kernel-mode drivers by Ashfaq @HackSysTeam 🎟️Get your ticket➡️bit.ly/3NWsFCH #NullconGoa2022 #training #windowskernel #infosec

nullcon's tweet image. 🚀Boost your skills to the kernel level!

 🖥️Learn the basics of Windows & driver internals, different memory corruption classes & fuzzing of kernel-mode drivers by Ashfaq @HackSysTeam 

🎟️Get your ticket➡️bit.ly/3NWsFCH

#NullconGoa2022 #training #windowskernel #infosec

Windows kernel pool spraying fun - Part 1 - Determine kernel object size bit.ly/2x4AORC #infosec #hacking #windowskernel #cyber

Hakin9's tweet image. Windows kernel pool spraying fun - Part 1 - Determine kernel object size bit.ly/2x4AORC #infosec #hacking #windowskernel #cyber

Liberan 71 parches de seguridad por recientes ataques a #MicrosoftOffice y #WindowsKernel. bit.ly/1OWoGEg

codigoverde's tweet image. Liberan 71 parches de seguridad por recientes ataques a #MicrosoftOffice y #WindowsKernel. bit.ly/1OWoGEg

Google outed an active #Windowsbug before Microsoft could #fix it. #Windowskernel tnw.to/2ehXrYl

mochahost's tweet image. Google outed an active #Windowsbug before Microsoft could #fix it. #Windowskernel

tnw.to/2ehXrYl

The severity of the Elevation of Privilege - Windows Kernel (CVE-2024-30088) has increased. А repository with technical details on this vulnerability and PoC appeared on GitHub. #Microsoft #Windows #WindowsKernel #ZDI #NtQueryInformationToken ➡️ t.me/avleonovcom/13…

leonov_av's tweet image. The severity of the Elevation of Privilege - Windows Kernel (CVE-2024-30088) has increased. А repository with technical details on this vulnerability and PoC appeared on GitHub. 
#Microsoft #Windows #WindowsKernel #ZDI #NtQueryInformationToken
➡️ t.me/avleonovcom/13…

Join our free #webinar: 🎯 "Windows Kernel Exploitation for Red Team Operators" 👉 loom.ly/VTXooaA This talk will guide you step-by-step into the world of #WindowsKernel exploitation, offering insights and tools needed to adapt and excel in modern #RedTeam operations.

NVISOsecurity's tweet image. Join our free #webinar: 🎯 "Windows Kernel Exploitation for Red Team Operators" 👉 loom.ly/VTXooaA
This talk will guide you step-by-step into the world of #WindowsKernel exploitation, offering insights and tools needed to adapt and excel in modern #RedTeam operations.

Loading...

Something went wrong.


Something went wrong.


United States Trends