Pentester's Promiscuous Notebook
search
⌘Ctrlk
TwitterGitHubBlog
Pentester's Promiscuous Notebook
  • README
  • ⚒️Pentest
    • C2
    • Infrastructure
    • OSINT
    • Password Brute Force
    • Perimeter
    • Shells
    • Web
    • Wi-Fi
  • ⚔️Red Team
    • Basics
    • Infrastructure
    • Development
      • API Hashing
      • API Hooking
      • BOF / COFF
      • CFG
      • Code Injection
      • DLL Hijacking
      • Golang
      • Kernel Mode
      • PIC / Shellcode
      • Nim
      • Sandbox Evasion
      • Syscalls
      • Windows API
  • 🐞Exploit Dev
    • BOF
    • RE
    • WinDbg
  • ⚙️Admin
    • Git
    • Linux
    • Networking
    • Virtualization
    • Windows
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. ⚔️Red Teamchevron-right
  2. Development

Kernel Mode

hashtag
Lord Of The Ring0

  • Part 1 | Introductionarrow-up-right

  • Part 2 | A tale of routines, IOCTLs and IRPsarrow-up-right

  • Part 3 | Sailing to the land of the user (and debugging the ship)arrow-up-right

  • Part 4 | The call back homearrow-up-right

  • Part 5 | Saruman's Manipulationarrow-up-right

  • https://github.com/Idov31/Nidhoggarrow-up-right

hashtag
Rootkits

  • https://github.com/daem0nc0re/VectorKernelarrow-up-right

hashtag
Tools

  • https://github.com/lem0nSec/KBlastarrow-up-right

hashtag
KKExecDD

  • https://github.com/floesen/KExecDDarrow-up-right

  • https://tierzerosecurity.co.nz/2024/04/29/kexecdd.htmlarrow-up-right

  • https://github.com/scrt/KexecDDPlusarrow-up-right

Last updated 5 months ago

  • Lord Of The Ring0
  • Rootkits
  • Tools
  • KKExecDD