Pentester's Promiscuous Notebook
search
Ctrlk
TwitterGitHubBlog
  • README
  • ⚒️Pentest
    • C2chevron-right
    • Infrastructurechevron-right
    • OSINTchevron-right
    • Password Brute Forcechevron-right
    • Perimeterchevron-right
    • Shellschevron-right
    • Webchevron-right
    • Wi-Fichevron-right
  • ⚔️Red Team
    • Basics
    • Infrastructure
    • Developmentchevron-right
      • API Hashing
      • API Hooking
      • BOF / COFF
      • CFG
      • Code Injectionchevron-right
      • DLL Hijacking
      • Golang
      • Kernel Mode
      • PIC / Shellcode
      • Nim
      • Sandbox Evasion
      • Syscalls
      • Windows API
  • 🐞Exploit Dev
    • BOFchevron-right
    • RE
    • WinDbg
  • ⚙️Admin
    • Git
    • Linuxchevron-right
    • Networkingchevron-right
    • Virtualizationchevron-right
    • Windows
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. ⚔️Red Teamchevron-right
  2. Development

Kernel Mode

hashtag
Lord Of The Ring0

  • Part 1 | Introductionarrow-up-right

  • Part 2 | A tale of routines, IOCTLs and IRPsarrow-up-right

  • Part 3 | Sailing to the land of the user (and debugging the ship)arrow-up-right

  • Part 4 | The call back homearrow-up-right

  • Part 5 | Saruman's Manipulationarrow-up-right

  • https://github.com/Idov31/Nidhoggarrow-up-right

hashtag
Rootkits

  • https://github.com/daem0nc0re/VectorKernelarrow-up-right

hashtag
Tools

  • https://github.com/lem0nSec/KBlastarrow-up-right

hashtag
KKExecDD

  • https://github.com/floesen/KExecDDarrow-up-right

  • https://tierzerosecurity.co.nz/2024/04/29/kexecdd.htmlarrow-up-right

  • https://github.com/scrt/KexecDDPlusarrow-up-right

Last updated 4 months ago

  • Lord Of The Ring0
  • Rootkits
  • Tools
  • KKExecDD