Part 1 | Introductionarrow-up-right
Part 2 | A tale of routines, IOCTLs and IRPsarrow-up-right
Part 3 | Sailing to the land of the user (and debugging the ship)arrow-up-right
Part 4 | The call back homearrow-up-right
Part 5 | Saruman's Manipulationarrow-up-right
https://github.com/Idov31/Nidhoggarrow-up-right
https://github.com/daem0nc0re/VectorKernelarrow-up-right
https://github.com/lem0nSec/KBlastarrow-up-right
https://github.com/floesen/KExecDDarrow-up-right
https://tierzerosecurity.co.nz/2024/04/29/kexecdd.htmlarrow-up-right
https://github.com/scrt/KexecDDPlusarrow-up-right
Last updated 4 months ago