Skip to content

tr3sp4ss3rexe/Windows-Kernel-Exploitation

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

44 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🔍 Windows Kernel - Exploration

A general collection of notes, tools, and code snippets focused on exploiting Windows kernel drivers for both research and offensive security purposes.

Some of the code snippets here are based on older vulnerable drivers like the HackSysExtremeVulnerableDriver for learning memory corruption and LPE bugs, while others touch on more modern techniques like BYOVD (Bring Your Own Vulnerable Driver) and malicious drivers for red teaming.


General Topics & Resources

PDB & PDB Parsing

Program Database (PDB) is a Microsoft-developed format used to store debugging symbols for binaries (e.g., DLLs and EXEs). These .pdb files are generated during compilation and are essential for debugging, reverse engineering, and understanding driver internals.

Tools for PDB Analysis

  • pdbex – Extract C-like definitions from .pdb files
    pdbex.exe _SID ntdll.pdb
    
  • symChk
    symchk /r c:\windows\system32\[filename] /s SRV*c:\symbols\*http://msdl.microsoft.com/download/symbols
    
  • PDBRipper – Has a GUI and is very easy to use

Kernel Debugging

Setting up Kernel Debugging via Network

WinDBG Kernel Debugging Cheatsheet


Anatomy of a Kernel Exploit

Understanding the components and techniques below is essential before diving into real-world exploitation. These are core primitives and ideas behind most Windows kernel exploits:


Kernel Mitigations & Defenses

These are built-in protections you’ll encounter (and potentially bypass) when developing or studying kernel exploits:


BYOVD Techniques

BYOVD is a powerful red teaming and post-exploitation technique where an attacker loads a legitimately signed but vulnerable driver into the kernel. This gives access to privileged operations such as arbitrary memory read/write, disabling security features, or executing code in kernel mode.


Useful Tools

  • IDA Free – Free version of IDA Pro, useful for static analysis of drivers.
  • CFF Explorer – PE editor to inspect and modify driver binaries.
  • Process Hacker – Advanced process viewer with support for viewing handles and token info.
  • Process Explorer – Sysinternals tool to inspect active processes in real time.
  • WinObjEx64 – Explore Windows kernel object manager namespace in detail.

Other resources

LOLDrivers

Releases

No releases published

Packages

No packages published