#windowskernel search results

Dive into how the Windows kernel really works — from GS:KPCR to undocumented calls and root-kit hooks. #WindowsKernel #ReverseEngineering #MalwareAnalysis fluxsec.red/reverse-engine… fluxsec.red

raashidbhatt's tweet image. Dive into how the Windows kernel really works — from GS:KPCR to undocumented calls and root-kit hooks. 

#WindowsKernel #ReverseEngineering #MalwareAnalysis 

fluxsec.red/reverse-engine… fluxsec.red

Dive deep into 64-bit Windows kernel holes: how wild-copy + user-fault-handling primitives give an exploit chain in Ring-0. theori.io/blog/exploitin… #WindowsKernel #ReverseEngineering #ExploitDev

raashidbhatt's tweet image. Dive deep into 64-bit Windows kernel holes: how wild-copy + user-fault-handling primitives give an exploit chain in Ring-0.  

theori.io/blog/exploitin… 

#WindowsKernel #ReverseEngineering #ExploitDev

IRQL storm on multi-core system? x86 routes interrupts via Local APIC → logical processor, not physical core. Windows KeSetTargetProcessor can misroute. Debug with !apic + !idt -a—wrong LAPIC ID = missed interrupts. #Interrupts #SMP #WindowsKernel


Are stack expansion and stack guard not present in the 64-bit version of Windows kernel? Stack Guard is not set in RtlCreateUserStack while creating the stack for a new thread #windowskernel #kernel

raashidbhatt's tweet image. Are stack expansion and stack guard not present in the 64-bit version of Windows kernel?

Stack Guard is not set in RtlCreateUserStack while creating  the stack for a new thread

#windowskernel #kernel

How to display the PML4E, PDPTE, PDE and PTE of the PTE itself in windbg / kd? stackoverflow.com/questions/6673… #windows #windowskernel #pagetables #windbg #kd

overflow_meme's tweet image. How to display the PML4E, PDPTE, PDE and PTE of the PTE itself in windbg / kd? stackoverflow.com/questions/6673… #windows #windowskernel #pagetables #windbg #kd

Here is the training stats of our @nullcon Goa, 2020 training on "Windows Kernel Exploitation" 📊 You can check training stats in the gif below. 👇 Want to join our next training? #Cybersecurity #WindowsKernel #Cyberattack #Security #InfoSec #ITSecurity #InfoSecurity


🚨 Blog 6 is out! Jay Pandya breaks down Out-Of-Bounds in Windows kernel drivers—how it works, how it breaks, and why it matters. Read it now via White Knight Labs: whiteknightlabs.com/2025/07/01/und… #Infosec #WindowsKernel #CyberSecurity #ExploitDev

WKL_cyber's tweet image. 🚨 Blog 6 is out!

Jay Pandya breaks down Out-Of-Bounds in Windows kernel drivers—how it works, how it breaks, and why it matters.

Read it now via White Knight Labs: whiteknightlabs.com/2025/07/01/und…

#Infosec #WindowsKernel #CyberSecurity #ExploitDev

Microsoft patched a high-severity Windows Kernel privilege escalation vulnerability in February, six months after being informed that the flaw was being exploited as a zero-day. #Microsoft #WindowsKernel #vulnerability #securitypatch #zeroday #cybersecurity #WindowsAppLocker

viehgroup's tweet image. Microsoft patched a high-severity Windows Kernel privilege escalation vulnerability in February, six months after being informed that the flaw was being exploited as a zero-day. 

#Microsoft #WindowsKernel #vulnerability #securitypatch #zeroday #cybersecurity #WindowsAppLocker

🚀Boost your skills to the kernel level! 🖥️Learn the basics of Windows & driver internals, different memory corruption classes & fuzzing of kernel-mode drivers by Ashfaq @HackSysTeam 🎟️Get your ticket➡️bit.ly/3NWsFCH #NullconGoa2022 #training #windowskernel #infosec

nullcon's tweet image. 🚀Boost your skills to the kernel level!

 🖥️Learn the basics of Windows & driver internals, different memory corruption classes & fuzzing of kernel-mode drivers by Ashfaq @HackSysTeam 

🎟️Get your ticket➡️bit.ly/3NWsFCH

#NullconGoa2022 #training #windowskernel #infosec

Join our free #webinar: 🎯 "Windows Kernel Exploitation for Red Team Operators" 👉 loom.ly/VTXooaA This talk will guide you step-by-step into the world of #WindowsKernel exploitation, offering insights and tools needed to adapt and excel in modern #RedTeam operations.

NVISOsecurity's tweet image. Join our free #webinar: 🎯 "Windows Kernel Exploitation for Red Team Operators" 👉 loom.ly/VTXooaA
This talk will guide you step-by-step into the world of #WindowsKernel exploitation, offering insights and tools needed to adapt and excel in modern #RedTeam operations.

Liberan 71 parches de seguridad por recientes ataques a #MicrosoftOffice y #WindowsKernel. bit.ly/1OWoGEg

codigoverde's tweet image. Liberan 71 parches de seguridad por recientes ataques a #MicrosoftOffice y #WindowsKernel. bit.ly/1OWoGEg

Dive deep into 64-bit Windows kernel holes: how wild-copy + user-fault-handling primitives give an exploit chain in Ring-0. theori.io/blog/exploitin… #WindowsKernel #ReverseEngineering #ExploitDev

raashidbhatt's tweet image. Dive deep into 64-bit Windows kernel holes: how wild-copy + user-fault-handling primitives give an exploit chain in Ring-0.  

theori.io/blog/exploitin… 

#WindowsKernel #ReverseEngineering #ExploitDev

IRQL storm on multi-core system? x86 routes interrupts via Local APIC → logical processor, not physical core. Windows KeSetTargetProcessor can misroute. Debug with !apic + !idt -a—wrong LAPIC ID = missed interrupts. #Interrupts #SMP #WindowsKernel


Dive into how the Windows kernel really works — from GS:KPCR to undocumented calls and root-kit hooks. #WindowsKernel #ReverseEngineering #MalwareAnalysis fluxsec.red/reverse-engine… fluxsec.red

raashidbhatt's tweet image. Dive into how the Windows kernel really works — from GS:KPCR to undocumented calls and root-kit hooks. 

#WindowsKernel #ReverseEngineering #MalwareAnalysis 

fluxsec.red/reverse-engine… fluxsec.red

Threat Actors are now weaponizing #WindowsKernel loaders for more stealthy and flexible attacks. By using signed kernel loaders TA has the ability to adjust their attacks on the fly, leaving minimal forensic traces making it harder to detect. Out of 600+ signed #maliciousdrivers

GroupIB_TI's tweet image. Threat Actors are now weaponizing #WindowsKernel loaders for more stealthy and flexible attacks. By using signed kernel loaders TA has the ability to adjust their attacks on the fly, leaving minimal forensic traces making it harder to detect. Out of 600+ signed #maliciousdrivers…
GroupIB_TI's tweet image. Threat Actors are now weaponizing #WindowsKernel loaders for more stealthy and flexible attacks. By using signed kernel loaders TA has the ability to adjust their attacks on the fly, leaving minimal forensic traces making it harder to detect. Out of 600+ signed #maliciousdrivers…

🚨 Blog 6 is out! Jay Pandya breaks down Out-Of-Bounds in Windows kernel drivers—how it works, how it breaks, and why it matters. Read it now via White Knight Labs: whiteknightlabs.com/2025/07/01/und… #Infosec #WindowsKernel #CyberSecurity #ExploitDev

WKL_cyber's tweet image. 🚨 Blog 6 is out!

Jay Pandya breaks down Out-Of-Bounds in Windows kernel drivers—how it works, how it breaks, and why it matters.

Read it now via White Knight Labs: whiteknightlabs.com/2025/07/01/und…

#Infosec #WindowsKernel #CyberSecurity #ExploitDev

Over 20 vulnerabilities in Windows Kernel Streaming (KS) revealed, mainly affecting frame buffer handling & MDL misuse, risking memory corruption & privilege escalation. Stay alert to these critical flaws! 🛡️ #WindowsKernel #BufferFlaws #US ift.tt/j3dimq6


Deep dive into how syscalls work in the Windows kernel, exploring structures, debugging, and reversing techniques. alice.climent-pommeret.red/posts/a-syscal… #WindowsKernel


Join our free #webinar: 🎯 "Windows Kernel Exploitation for Red Team Operators" 👉 loom.ly/VTXooaA This talk will guide you step-by-step into the world of #WindowsKernel exploitation, offering insights and tools needed to adapt and excel in modern #RedTeam operations.

NVISOsecurity's tweet image. Join our free #webinar: 🎯 "Windows Kernel Exploitation for Red Team Operators" 👉 loom.ly/VTXooaA
This talk will guide you step-by-step into the world of #WindowsKernel exploitation, offering insights and tools needed to adapt and excel in modern #RedTeam operations.

[Cracking Windows Kernel with HEVD] Chapter 3: Can we rop our way into triggering our shellcode? #windowskernel #exploit #HEVD #ROPchain #privilegeescalation mdanilor.github.io/posts/hevd-3/


Dive into how the Windows kernel really works — from GS:KPCR to undocumented calls and root-kit hooks. #WindowsKernel #ReverseEngineering #MalwareAnalysis fluxsec.red/reverse-engine… fluxsec.red

raashidbhatt's tweet image. Dive into how the Windows kernel really works — from GS:KPCR to undocumented calls and root-kit hooks. 

#WindowsKernel #ReverseEngineering #MalwareAnalysis 

fluxsec.red/reverse-engine… fluxsec.red

Dive deep into 64-bit Windows kernel holes: how wild-copy + user-fault-handling primitives give an exploit chain in Ring-0. theori.io/blog/exploitin… #WindowsKernel #ReverseEngineering #ExploitDev

raashidbhatt's tweet image. Dive deep into 64-bit Windows kernel holes: how wild-copy + user-fault-handling primitives give an exploit chain in Ring-0.  

theori.io/blog/exploitin… 

#WindowsKernel #ReverseEngineering #ExploitDev

Threat Actors are now weaponizing #WindowsKernel loaders for more stealthy and flexible attacks. By using signed kernel loaders TA has the ability to adjust their attacks on the fly, leaving minimal forensic traces making it harder to detect. Out of 600+ signed #maliciousdrivers

GroupIB_TI's tweet image. Threat Actors are now weaponizing #WindowsKernel loaders for more stealthy and flexible attacks. By using signed kernel loaders TA has the ability to adjust their attacks on the fly, leaving minimal forensic traces making it harder to detect. Out of 600+ signed #maliciousdrivers…
GroupIB_TI's tweet image. Threat Actors are now weaponizing #WindowsKernel loaders for more stealthy and flexible attacks. By using signed kernel loaders TA has the ability to adjust their attacks on the fly, leaving minimal forensic traces making it harder to detect. Out of 600+ signed #maliciousdrivers…

Are stack expansion and stack guard not present in the 64-bit version of Windows kernel? Stack Guard is not set in RtlCreateUserStack while creating the stack for a new thread #windowskernel #kernel

raashidbhatt's tweet image. Are stack expansion and stack guard not present in the 64-bit version of Windows kernel?

Stack Guard is not set in RtlCreateUserStack while creating  the stack for a new thread

#windowskernel #kernel

🚨 Blog 6 is out! Jay Pandya breaks down Out-Of-Bounds in Windows kernel drivers—how it works, how it breaks, and why it matters. Read it now via White Knight Labs: whiteknightlabs.com/2025/07/01/und… #Infosec #WindowsKernel #CyberSecurity #ExploitDev

WKL_cyber's tweet image. 🚨 Blog 6 is out!

Jay Pandya breaks down Out-Of-Bounds in Windows kernel drivers—how it works, how it breaks, and why it matters.

Read it now via White Knight Labs: whiteknightlabs.com/2025/07/01/und…

#Infosec #WindowsKernel #CyberSecurity #ExploitDev

Microsoft patched a high-severity Windows Kernel privilege escalation vulnerability in February, six months after being informed that the flaw was being exploited as a zero-day. #Microsoft #WindowsKernel #vulnerability #securitypatch #zeroday #cybersecurity #WindowsAppLocker

viehgroup's tweet image. Microsoft patched a high-severity Windows Kernel privilege escalation vulnerability in February, six months after being informed that the flaw was being exploited as a zero-day. 

#Microsoft #WindowsKernel #vulnerability #securitypatch #zeroday #cybersecurity #WindowsAppLocker

How to display the PML4E, PDPTE, PDE and PTE of the PTE itself in windbg / kd? stackoverflow.com/questions/6673… #windows #windowskernel #pagetables #windbg #kd

overflow_meme's tweet image. How to display the PML4E, PDPTE, PDE and PTE of the PTE itself in windbg / kd? stackoverflow.com/questions/6673… #windows #windowskernel #pagetables #windbg #kd

Here is the training stats of our @nullcon Goa, 2020 training on "Windows Kernel Exploitation" 📊 You can check training stats in the gif below. 👇 Want to join our next training? #Cybersecurity #WindowsKernel #Cyberattack #Security #InfoSec #ITSecurity #InfoSecurity


Liberan 71 parches de seguridad por recientes ataques a #MicrosoftOffice y #WindowsKernel. bit.ly/1OWoGEg

codigoverde's tweet image. Liberan 71 parches de seguridad por recientes ataques a #MicrosoftOffice y #WindowsKernel. bit.ly/1OWoGEg

🚀Boost your skills to the kernel level! 🖥️Learn the basics of Windows & driver internals, different memory corruption classes & fuzzing of kernel-mode drivers by Ashfaq @HackSysTeam 🎟️Get your ticket➡️bit.ly/3NWsFCH #NullconGoa2022 #training #windowskernel #infosec

nullcon's tweet image. 🚀Boost your skills to the kernel level!

 🖥️Learn the basics of Windows & driver internals, different memory corruption classes & fuzzing of kernel-mode drivers by Ashfaq @HackSysTeam 

🎟️Get your ticket➡️bit.ly/3NWsFCH

#NullconGoa2022 #training #windowskernel #infosec

Windows kernel pool spraying fun - Part 1 - Determine kernel object size bit.ly/2x4AORC #infosec #hacking #windowskernel #cyber

Hakin9's tweet image. Windows kernel pool spraying fun - Part 1 - Determine kernel object size bit.ly/2x4AORC #infosec #hacking #windowskernel #cyber

The severity of the Elevation of Privilege - Windows Kernel (CVE-2024-30088) has increased. А repository with technical details on this vulnerability and PoC appeared on GitHub. #Microsoft #Windows #WindowsKernel #ZDI #NtQueryInformationToken ➡️ t.me/avleonovcom/13…

leonov_av's tweet image. The severity of the Elevation of Privilege - Windows Kernel (CVE-2024-30088) has increased. А repository with technical details on this vulnerability and PoC appeared on GitHub. 
#Microsoft #Windows #WindowsKernel #ZDI #NtQueryInformationToken
➡️ t.me/avleonovcom/13…

Google outed an active #Windowsbug before Microsoft could #fix it. #Windowskernel tnw.to/2ehXrYl

mochahost's tweet image. Google outed an active #Windowsbug before Microsoft could #fix it. #Windowskernel

tnw.to/2ehXrYl

Loading...

Something went wrong.


Something went wrong.


United States Trends