zerosum0x0.blogspot.de - zerosum0x0

Example domain paragraphs

reverse engineering, penetration testing, exploit development

This post describes a kernel mode payload for Windows NT called "SassyKitdi" (LSASS + Rootkit + TDI). This payload is of a nature that can be deployed via remote kernel exploits such as EternalBlue, BlueKeep, and SMBGhost, as well as from local kernel exploits, i.e. bad drivers. This exploit payload is universal from (at least) Windows 2000 to Windows 10, and without having to carry around weird DKOM offsets. The payload has 0 interaction with user-mode, and creates a reverse TCP socket using the Transport

tl;dr: PoC || GTFO