Link to this headingExploitation

Windows Kernel Exploitation Tutorial Part 1: Setting up the Environment

Rusty Windows Kernel Rootkit
Anti Cheats

Link to this headingProtections

SMAP (Supervisor Mode Access Prevention) - Prevent the Kernel from accessing user mapped memory
SMEP (Supervisor Mode Execution Prevention) - Prevent Kernel mode from executing code from usermode

Both of these flags are in the CR4 register

Link to this headingMapping Physical Memory

Vulnerable Driver to manipulate physical memory and the kernel

Link to this headingDriver Exploitation

How to exploit a vulnerable windows driver

Link to this headingPrivilege Escalation

Copy the security token from the INIT process

Exploiting a Windows 10 PagedPool off-by-one overflow (WCTF 2018)

Link to this headingWindows Syscalls

Windows System Call Tables