Media Summary: Learn to develop modern malware and more BYOVD techniques with Maldev Academy! The Intel vPro® platform helps mitigate low-level Yeah you said when uh creating your database you would only use the latest version of the

Kernel Exploitation Via Vulnerable Drivers - Detailed Analysis & Overview

Learn to develop modern malware and more BYOVD techniques with Maldev Academy! The Intel vPro® platform helps mitigate low-level Yeah you said when uh creating your database you would only use the latest version of the As the rest of the Android security infrastructure improves, the Android/Linux In this video, I demonstrate Windows privilege escalation using changing protected process and hiding process BYOVD : Rootkit Development for Red team Operations

Hi all I've started to create this video series on LOLDrivers: Mike Haag: The HTA Generator will be released and in a public ... Though many security mechanisms are deployed in Apple's macOS and iOS systems, some old-fashioned or poor-quality

Photo Gallery

Kernel Exploitation via Vulnerable Drivers
How Hackers Exploit Vulnerable Drivers
ROP is DEAD! Kernel Driver Binary Exploitation
Exploiting The Core: A Deep Dive Into Kernel Driver Vulnerability Hunting - Jan-Jaap Korpershoek
Uncovering Kernel Exploits: Exploring Vulnerabilities in AMD's Windows Kernel Drivers
OffensiveCon20 - Alexander Popov - Exploiting a Linux Kernel Vulnerability in the V4L2 Subsystem
Windows Kernel Exploitation for Beginners – Privilege Escalation(Hindi)
DIFUZE: Android Kernel Driver Fuzzing
Windows Privilege Escalation via Kernel Exploits | From User to SYSTEM
Kernel Root Exploit via a ptrace() and execve() Race Condition
BYOVD : Rootkit Development | Exploiting the signed kernel driver ThrottleStop.sys ( Cve-2025-7771 )
Kernel Exploitation on HEVD #1: Stack Overflow + Environment Setup
View Detailed Profile
Kernel Exploitation via Vulnerable Drivers

Kernel Exploitation via Vulnerable Drivers

Signed but

How Hackers Exploit Vulnerable Drivers

How Hackers Exploit Vulnerable Drivers

https://jh.live/maldevacademy || Learn to develop modern malware and more BYOVD techniques with Maldev Academy!

ROP is DEAD! Kernel Driver Binary Exploitation

ROP is DEAD! Kernel Driver Binary Exploitation

https://jh.live/vpro || The Intel vPro® platform helps mitigate low-level

Exploiting The Core: A Deep Dive Into Kernel Driver Vulnerability Hunting - Jan-Jaap Korpershoek

Exploiting The Core: A Deep Dive Into Kernel Driver Vulnerability Hunting - Jan-Jaap Korpershoek

Yeah you said when uh creating your database you would only use the latest version of the

Uncovering Kernel Exploits: Exploring Vulnerabilities in AMD's Windows Kernel Drivers

Uncovering Kernel Exploits: Exploring Vulnerabilities in AMD's Windows Kernel Drivers

Uncovering

OffensiveCon20 - Alexander Popov - Exploiting a Linux Kernel Vulnerability in the V4L2 Subsystem

OffensiveCon20 - Alexander Popov - Exploiting a Linux Kernel Vulnerability in the V4L2 Subsystem

https://www.offensivecon.org/speakers/2020/alexander-popov.html.

Windows Kernel Exploitation for Beginners – Privilege Escalation(Hindi)

Windows Kernel Exploitation for Beginners – Privilege Escalation(Hindi)

oscp #windows #

DIFUZE: Android Kernel Driver Fuzzing

DIFUZE: Android Kernel Driver Fuzzing

As the rest of the Android security infrastructure improves, the Android/Linux

Windows Privilege Escalation via Kernel Exploits | From User to SYSTEM

Windows Privilege Escalation via Kernel Exploits | From User to SYSTEM

In this video, I demonstrate Windows privilege escalation using

Kernel Root Exploit via a ptrace() and execve() Race Condition

Kernel Root Exploit via a ptrace() and execve() Race Condition

Let's have a look at a recent

BYOVD : Rootkit Development | Exploiting the signed kernel driver ThrottleStop.sys ( Cve-2025-7771 )

BYOVD : Rootkit Development | Exploiting the signed kernel driver ThrottleStop.sys ( Cve-2025-7771 )

changing protected process and hiding process BYOVD : Rootkit Development for Red team Operations

Kernel Exploitation on HEVD #1: Stack Overflow + Environment Setup

Kernel Exploitation on HEVD #1: Stack Overflow + Environment Setup

Hi all I've started to create this video series on

Kernel Driver Vulnerabilities | AT&T ThreatTraq

Kernel Driver Vulnerabilities | AT&T ThreatTraq

https://www.welivesecurity.com/2022/01/11/signed-

Windows Kernel Exploitation Part- 3: Loading HEVD Drivers and Debugging with PDB Files

Windows Kernel Exploitation Part- 3: Loading HEVD Drivers and Debugging with PDB Files

Welcome to Part 3 of our Windows

VULNERABLE Kernel Drivers for Security Research

VULNERABLE Kernel Drivers for Security Research

LOLDrivers: https://loldrivers.io/ Mike Haag: https://twitter.com/M_haggis The HTA Generator will be released and in a public ...

Nullcon Goa 2018:- Unleashing D* on Android Kernel Drivers

Nullcon Goa 2018:- Unleashing D* on Android Kernel Drivers

Unleashing D* on Android

DEF CON 26 - Bai and Zheng  - Analyzing and Attacking Apple Kernel Drivers

DEF CON 26 - Bai and Zheng - Analyzing and Attacking Apple Kernel Drivers

Though many security mechanisms are deployed in Apple's macOS and iOS systems, some old-fashioned or poor-quality

RVAsec 2025: Kevin Massey - Linux Kernel Exploitation for Beginners

RVAsec 2025: Kevin Massey - Linux Kernel Exploitation for Beginners

Presentation: Linux